Analysis
-
max time kernel
131s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 21:59
Static task
static1
Behavioral task
behavioral1
Sample
af1a9812865af53b7ac2508dc0b2a3e7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
af1a9812865af53b7ac2508dc0b2a3e7.exe
Resource
win10v2004-20231215-en
General
-
Target
af1a9812865af53b7ac2508dc0b2a3e7.exe
-
Size
10KB
-
MD5
af1a9812865af53b7ac2508dc0b2a3e7
-
SHA1
1312d9c4c70180300ae44b5339b56b19d6c51ead
-
SHA256
a8c53cb1c5d1a1caeba3d08b332a601c40543b326442015aa7b4082167d747d0
-
SHA512
6badbd2d13f12dab60c6234b0a0a5f107c2685b8cb2920b0af8f31556d9f84b1421810cdaec85492b1ecf6ac1a34bd459d60de37a3eab58482041811903f7691
-
SSDEEP
192:A8QHHGfrRRtHgOs3+2qJvMvzk2tBdHr4CtPLIlThjSug/K:xSErRRBgh3+2qJozk2FUCtkl1jcy
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 checkip.dyndns.org -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 504 systeminfo.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3160 af1a9812865af53b7ac2508dc0b2a3e7.exe Token: SeDebugPrivilege 4896 whoami.exe Token: SeSecurityPrivilege 5068 msiexec.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3160 wrote to memory of 788 3160 af1a9812865af53b7ac2508dc0b2a3e7.exe 89 PID 3160 wrote to memory of 788 3160 af1a9812865af53b7ac2508dc0b2a3e7.exe 89 PID 3160 wrote to memory of 788 3160 af1a9812865af53b7ac2508dc0b2a3e7.exe 89 PID 788 wrote to memory of 4896 788 cmd.exe 91 PID 788 wrote to memory of 4896 788 cmd.exe 91 PID 788 wrote to memory of 4896 788 cmd.exe 91 PID 3160 wrote to memory of 648 3160 af1a9812865af53b7ac2508dc0b2a3e7.exe 93 PID 3160 wrote to memory of 648 3160 af1a9812865af53b7ac2508dc0b2a3e7.exe 93 PID 3160 wrote to memory of 648 3160 af1a9812865af53b7ac2508dc0b2a3e7.exe 93 PID 648 wrote to memory of 3960 648 cmd.exe 94 PID 648 wrote to memory of 3960 648 cmd.exe 94 PID 648 wrote to memory of 3960 648 cmd.exe 94 PID 3160 wrote to memory of 560 3160 af1a9812865af53b7ac2508dc0b2a3e7.exe 102 PID 3160 wrote to memory of 560 3160 af1a9812865af53b7ac2508dc0b2a3e7.exe 102 PID 3160 wrote to memory of 560 3160 af1a9812865af53b7ac2508dc0b2a3e7.exe 102 PID 560 wrote to memory of 504 560 cmd.exe 104 PID 560 wrote to memory of 504 560 cmd.exe 104 PID 560 wrote to memory of 504 560 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\af1a9812865af53b7ac2508dc0b2a3e7.exe"C:\Users\Admin\AppData\Local\Temp\af1a9812865af53b7ac2508dc0b2a3e7.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\whoami.exewhoami3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\getmac.exegetmac3⤵PID:3960
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:504
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5068