Analysis
-
max time kernel
52s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 20:13
Behavioral task
behavioral1
Sample
f51b489073e0a0e9fff1a9d8f0e09185.exe
Resource
win7-20231215-en
10 signatures
150 seconds
General
-
Target
f51b489073e0a0e9fff1a9d8f0e09185.exe
-
Size
5.4MB
-
MD5
f51b489073e0a0e9fff1a9d8f0e09185
-
SHA1
c8a2cf999334870c51ead8e366ce51ee916b6e3f
-
SHA256
e4c2460165de097c187d1a646cfc513d32a9130a0e3fe40a359f82b54987bb23
-
SHA512
c724d3245868a6a6a90ad0f169ba39857f192809ac0e0b7919ebd53ca7669080703571fd235e129130ddc157286534905dcb6ca7e951e7d8ce3347184eb89484
-
SSDEEP
98304:7aK90IOLFoFMy2Wt6E8jtpOEv9NdHkyLhiCyIgFfffHyBUMUbv5wOJERH:X9POJa2WD69Nay8Mg1ffS2/K4ER
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3224-1-0x00000000008E0000-0x0000000001190000-memory.dmp vmprotect behavioral2/memory/3224-3-0x00000000008E0000-0x0000000001190000-memory.dmp vmprotect behavioral2/memory/3224-7-0x00000000008E0000-0x0000000001190000-memory.dmp vmprotect behavioral2/memory/3224-83-0x00000000008E0000-0x0000000001190000-memory.dmp vmprotect -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 icanhazip.com -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3224 f51b489073e0a0e9fff1a9d8f0e09185.exe 3224 f51b489073e0a0e9fff1a9d8f0e09185.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3224 wrote to memory of 1540 3224 f51b489073e0a0e9fff1a9d8f0e09185.exe 103 PID 3224 wrote to memory of 1540 3224 f51b489073e0a0e9fff1a9d8f0e09185.exe 103 PID 3224 wrote to memory of 1540 3224 f51b489073e0a0e9fff1a9d8f0e09185.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\f51b489073e0a0e9fff1a9d8f0e09185.exe"C:\Users\Admin\AppData\Local\Temp\f51b489073e0a0e9fff1a9d8f0e09185.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MAC.bat"2⤵PID:1540
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell get-NetAdapter3⤵PID:4908
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\GenReg.exe" [29548]--[441325395]--[14774,14774c,14774w,14774wc]--[330994046,330994046c]2⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\GenReg.exeC:\Users\Admin\AppData\Local\Temp\GenReg.exe [29548]--[441325395]--[14774,14774c,14774w,14774wc]--[330994046,330994046c]3⤵PID:3380
-
-