Analysis
-
max time kernel
3s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 12:50
Static task
static1
Behavioral task
behavioral1
Sample
6fd43f137db0c8472dc0d64be1190bc6.exe
Resource
win7-20231215-en
General
-
Target
6fd43f137db0c8472dc0d64be1190bc6.exe
-
Size
6.0MB
-
MD5
6fd43f137db0c8472dc0d64be1190bc6
-
SHA1
d1feb73da26dcc12198088dacc6dd9caf6417a36
-
SHA256
232c76d65ab1d36fd73d1c8977bbd63a415a98fc2a7a65648003810584d05ecb
-
SHA512
f2abf2c3996cd78d35a495ba1b8b951067e9f679ffafb994c53e6cdec8a49034313f4158f6596fd8178ada20b569fa671109381a69b3a4e43c447271152b68ef
-
SSDEEP
98304:tT1v0Sc5LEgwytj2KJHZpz+v2zU0XWbbr5vMjl2iQu9ntFEPZ8YGpnN6p:l18S6ZyKJz+ezUHQtBEp
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/871356915303710720/aJQeq8OY3wwqIiXWkN97pUlIjJQhxawbR5zbwOuO96jrzWKG4INekUUjRxLOjy9VbIsi
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 Fatality Loader.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 freegeoip.app 3 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2744 2900 6fd43f137db0c8472dc0d64be1190bc6.exe 28 PID 2900 wrote to memory of 2744 2900 6fd43f137db0c8472dc0d64be1190bc6.exe 28 PID 2900 wrote to memory of 2744 2900 6fd43f137db0c8472dc0d64be1190bc6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fd43f137db0c8472dc0d64be1190bc6.exe"C:\Users\Admin\AppData\Local\Temp\6fd43f137db0c8472dc0d64be1190bc6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Fatality Loader.exe"C:\Users\Admin\AppData\Local\Temp\Fatality Loader.exe"2⤵
- Executes dropped EXE
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\CFG.exe"C:\Users\Admin\AppData\Local\Temp\CFG.exe"2⤵PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\Fatality.win.exe"C:\Users\Admin\AppData\Local\Temp\Fatality.win.exe"2⤵PID:2976
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://java.com/download3⤵PID:1652
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:24⤵PID:1760
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574ff081de32dc53eb255564a0459e754
SHA11471c0c5a42e1836a47a60c0769a82b2bbec1e99
SHA256f22712b52159db1335655ec852b088ef702446743d4ead83f2be4adf197d2bdf
SHA512c6e2935be4bf05d50e3ffa091da43d5970e87080b144e024ef015b04cb524fd9714f29147bec300df13e6bdfca38c5e647a55cace23e43516536ead6c0dd7610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb42f18fd443c4f817cc88f460c27914
SHA16f4d46ac3c16d4406c8f08e5afd32ca55cd0585b
SHA25682c2e67336998a8f3a81d3cb265d34b50d4743e173ba23a4459f5de54f1d0f91
SHA5121e68fda8ddc18c874f17a945ec38f136d36fec53613b3ca38e5ccead250423645bb49b924d3b06bd7253f071568b1707f59d06f7353774d22f3355bec9496b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55759cefa9b5838e38640cef0691a4102
SHA1dd8fd2bdc1815a0be9b9d6ada4b17664aec8f07f
SHA256f730cb2fdac84da64b95bd6602c46b216653a7c67d1feb321c8debb7144992ab
SHA512778fc4f3e8d86cbabb4cae8ce315261c6ce68a43ce17d0cca9b10d8d83882571fa26a9f55f5cea633f1c6fac04a2f2d50853a9b6b7853aa83a2ca1d3b6d29d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5566bdceb0da0cf7ef373ddc7fcc973cd
SHA1e8f7f4cff763c0bad5e67bb5ac54ad4b455f4f21
SHA25667534a96e8d2f2438728184b25d1bdf32f823e63db7908aed45b2d63b7533286
SHA512fd359935d08eca52f635c2da1ac80d1b6848ed21ab4de384aa0ecf0d154bbf61d645557be252ffc06c2e5f7726bf9e541cdb9583d1c2107ff4ae3789e89d06d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54730ff08f4b4faafa60fec5218fecf9e
SHA1aefe0051078ed1c746aac4cad1ad7efa7c0e0aa5
SHA2567cffb29d74bb639120f94a414226f2a7c0a561b95fb0aaed8d6d30ac278d5040
SHA512990bda14b422dc5327316257bc7508e756e2ff2850c83277dd73d0ef4dbdbb9c81c62e8931734f0df002471abb3054b3d5e8596d36250f31e19ccd0e43c8b7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cf8cbdf2465872593a70337db3805b8
SHA1f650e85f596d8e6e3a3c18679efc2cdee3711d62
SHA2567a73d53250fc7b84633c65c5e73d8209193bbf5835ba39542269675300932882
SHA512a081a02171b873c56632bea09032a5f902ee6e1771484ebc5aeed861100788fb26d40425be30930fc93c10c893c04128d34b147d2ac4b39820d5c45eb3eb641d
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
195B
MD5b9f143d39af2792afd1b2bdfb44aa4d0
SHA1cd5ff3f01c8d4f19800c8e178125e61aff52e954
SHA2562e06e7c8d557e5855daa0466adce69177889c37f9755bb1c3e50205fc52a3ba1
SHA51238bea3160bf17eb7e2a90e4800f869814ceba32148d1413c4122959a81695884acd0deae327ada6add487cb80be8f3765546ecc612c18df6a16e4e6a50eee117
-
Filesize
1KB
MD54939ad55d5aea05e74044a52d6fe9ee9
SHA10b69eee1239bab5c624dbadf36bcfce53c233ca8
SHA256029942c9a0a0de318b967e6c4583ce48af43e94111ec312acb9a80c1b2ef09ff
SHA512f22a0e87511446ace9654736bce588e287585868f909a144cc7e5802c60dbc5d87fcc425bbe1a2c8da86e2de3b0d0a959676879477cc94b036cfe76ab73e1ec8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\favicon[1].ico
Filesize1KB
MD58e39f067cc4f41898ef342843171d58a
SHA1ab19e81ce8ccb35b81bf2600d85c659e78e5c880
SHA256872bad18b566b0833d6b496477daab46763cf8bdec342d34ac310c3ac045cefd
SHA51247cd7f4ce8fcf0fc56b6ffe50450c8c5f71e3c379ecfcfd488d904d85ed90b4a8dafa335d0e9ca92e85b02b7111c9d75205d12073253eed681868e2a46c64890
-
Filesize
33KB
MD56ded39def9263c60e13d8682b44c9126
SHA18c19f53028f62332bb362cb94fa51d28d2e66784
SHA256451327b9d20f9e770bc7f5d5f58015ae72f4cf9d6e7a26960219ae5a0f606266
SHA512bc8f625e87e1242ea3f15ab2dbade757b6ceead5da6e38bea164daf69922b2448256ad95d83cef2a9169d13d480aa91efbd76ffa01a000d8ce9cc6f7f94952aa
-
Filesize
45KB
MD539285b3852852fb95d2144742d5e6556
SHA163b6a4d28815e2f10ab63a531077ea3963c12860
SHA2560a54c6428c7e8ba3a5b6149964d0ab59fe4449605296687468d7856559512eae
SHA5127e3bff7e76e88dd3fb92b1d9845aff8307006af5be2906f15233fea3bdf5a2f74f616e6d3f72e07691ba9a187e5c607e6c0ebe330619afb6a560d47139a2507d
-
Filesize
299KB
MD5c62e8659a538d545f07e0c9f9d4e7473
SHA1feaa24f501803d8f179732d4920561deb8b4c08f
SHA2565895294f317b1cf6c4598d293501249917f8177adea6c0f4241517ee2596365e
SHA512d0c46943279825cebf4de80d50b53fea409d2ecfae9922af97c93f199b62fdf572a278bdee04fe2a13cf7be8a2ac1fa92a081a8b614a0a89348d894600b1d5ed
-
Filesize
137KB
MD55a9c44c015ec6234a2f68ebae7fc1545
SHA1309d6c49bd5770c4194426a27ed4a3f82ba1aae0
SHA2563da44fce565e0de69fd4aa857725ac481eead6f25a339d02d3f83e78e6e58d6d
SHA51226d222c655c83a41c0d50b82f87c01fc89cb803ff484dcbe9895e72a3742295db5a0c5d558124d441c27df0cd2a6ed29bc9c387234d8f2999a2dacc76e564274
-
Filesize
31KB
MD59f48b26dd55a91cd7f8f73fc1e31334a
SHA15473c9c76db6c82d52f25bcc02c57a154dbd9710
SHA2560a779f92d078aa5d380b1f5d2295b4890b1dde14442328249d324c50c437d8d9
SHA51236fff8a225cf53c7698512ae4fc76ddd00f8c47c5c50d9149c86863831b395098971bc63016280e8e8ca955328d1deac0638e70c295c54e2e0e0d18894b7928c