Analysis
-
max time kernel
119s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 23:42
Behavioral task
behavioral1
Sample
1a69935073fb2ff90d74e75428854bf8.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
1a69935073fb2ff90d74e75428854bf8.exe
-
Size
1.9MB
-
MD5
1a69935073fb2ff90d74e75428854bf8
-
SHA1
41abbb5100a64a9637cd5af6b678902baf731013
-
SHA256
3422b33a307f80a5dad2882982e061d1ed496f7a1b5c6541fdde8cbab133af7a
-
SHA512
cdf36b6ce52de3447154d64d3c3d180b8a540f51d2c60cac1bd04b440e51c1050cbb16a15935ffc5c1c2b93b0a4c3d26c0278c612f6171835b09bc650342538b
-
SSDEEP
49152:3eSgHKhG7DuyiTDi+EjIJo54clgLH+tkWJ0:upq47DfsibIFcKHgkWJ0
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1700-0-0x00000000009A0000-0x0000000000CB4000-memory.dmp vmprotect -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1700 1a69935073fb2ff90d74e75428854bf8.exe