Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 18:49
Behavioral task
behavioral1
Sample
f01ed61c293a838f8db9cd86e84eaeee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f01ed61c293a838f8db9cd86e84eaeee.exe
Resource
win10v2004-20231215-en
General
-
Target
f01ed61c293a838f8db9cd86e84eaeee.exe
-
Size
13KB
-
MD5
f01ed61c293a838f8db9cd86e84eaeee
-
SHA1
f052e9481b6613588474c90395cc7a3b9339f71c
-
SHA256
c28331ddbb9f519cfe6b6dbed4f947438e2a1aa5e09a583a44321152d9bdfe90
-
SHA512
a5273c7be22b73682e9ad02c8fc6eacd4a1161335bcba1b80ac470cece1270ab24c72a88529f449e48beba8fa6b1a2cb19f104ec291bc879f3ebede406309c18
-
SSDEEP
192:F63ft5sW0h0ExU+XP5aJf9lJMCl7M+J5068KcwuZ:mtKW/aP8Jf9/XJM8pu
Malware Config
Extracted
growtopia
https://discord.com/api/webhooks/868185685511798824/n1UTeZkfBFoxLWBaV9dnLZ0QpTexYyhEZWPPeMAw8jxUZJ6gQkBUFF9Om3akpjQoXALi
-
payload_url
https://cdn.discordapp.com/attachments/805061254648954893/845198803157123072/savedecrypter.exe
https://cdn.discordapp.com/attachments/831259039135563876/844989460450115584/Screenshot_2.png
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 icanhazip.com -
Program crash 1 IoCs
pid pid_target Process procid_target 1960 2508 WerFault.exe 14 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2508 f01ed61c293a838f8db9cd86e84eaeee.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 1960 2508 f01ed61c293a838f8db9cd86e84eaeee.exe 28 PID 2508 wrote to memory of 1960 2508 f01ed61c293a838f8db9cd86e84eaeee.exe 28 PID 2508 wrote to memory of 1960 2508 f01ed61c293a838f8db9cd86e84eaeee.exe 28 PID 2508 wrote to memory of 1960 2508 f01ed61c293a838f8db9cd86e84eaeee.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f01ed61c293a838f8db9cd86e84eaeee.exe"C:\Users\Admin\AppData\Local\Temp\f01ed61c293a838f8db9cd86e84eaeee.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 16322⤵
- Program crash
PID:1960
-