Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 18:49
Behavioral task
behavioral1
Sample
f01ed61c293a838f8db9cd86e84eaeee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f01ed61c293a838f8db9cd86e84eaeee.exe
Resource
win10v2004-20231215-en
General
-
Target
f01ed61c293a838f8db9cd86e84eaeee.exe
-
Size
13KB
-
MD5
f01ed61c293a838f8db9cd86e84eaeee
-
SHA1
f052e9481b6613588474c90395cc7a3b9339f71c
-
SHA256
c28331ddbb9f519cfe6b6dbed4f947438e2a1aa5e09a583a44321152d9bdfe90
-
SHA512
a5273c7be22b73682e9ad02c8fc6eacd4a1161335bcba1b80ac470cece1270ab24c72a88529f449e48beba8fa6b1a2cb19f104ec291bc879f3ebede406309c18
-
SSDEEP
192:F63ft5sW0h0ExU+XP5aJf9lJMCl7M+J5068KcwuZ:mtKW/aP8Jf9/XJM8pu
Malware Config
Extracted
growtopia
https://discord.com/api/webhooks/868185685511798824/n1UTeZkfBFoxLWBaV9dnLZ0QpTexYyhEZWPPeMAw8jxUZJ6gQkBUFF9Om3akpjQoXALi
-
payload_url
https://cdn.discordapp.com/attachments/805061254648954893/845198803157123072/savedecrypter.exe
https://cdn.discordapp.com/attachments/831259039135563876/844989460450115584/Screenshot_2.png
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 icanhazip.com -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1960 2508 WerFault.exe f01ed61c293a838f8db9cd86e84eaeee.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f01ed61c293a838f8db9cd86e84eaeee.exedescription pid process Token: SeDebugPrivilege 2508 f01ed61c293a838f8db9cd86e84eaeee.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
f01ed61c293a838f8db9cd86e84eaeee.exedescription pid process target process PID 2508 wrote to memory of 1960 2508 f01ed61c293a838f8db9cd86e84eaeee.exe WerFault.exe PID 2508 wrote to memory of 1960 2508 f01ed61c293a838f8db9cd86e84eaeee.exe WerFault.exe PID 2508 wrote to memory of 1960 2508 f01ed61c293a838f8db9cd86e84eaeee.exe WerFault.exe PID 2508 wrote to memory of 1960 2508 f01ed61c293a838f8db9cd86e84eaeee.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f01ed61c293a838f8db9cd86e84eaeee.exe"C:\Users\Admin\AppData\Local\Temp\f01ed61c293a838f8db9cd86e84eaeee.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 16322⤵
- Program crash
PID:1960
-