Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 22:49
Static task
static1
Behavioral task
behavioral1
Sample
1ef652cf753aac92977c2cfea7fe08c4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1ef652cf753aac92977c2cfea7fe08c4.exe
Resource
win10v2004-20231215-en
General
-
Target
1ef652cf753aac92977c2cfea7fe08c4.exe
-
Size
3.1MB
-
MD5
1ef652cf753aac92977c2cfea7fe08c4
-
SHA1
2c4b9cb5ae6f174c97626c02a4a122e48c43dee2
-
SHA256
6ebeb06cb2d2beddb16bfd2a4e689ac133b34e734954b694edf0aa2c3ea25ae6
-
SHA512
3ea9fdbaaf006ffe69b126e92398a779e1887865a8b555f0e39fb31c0ea8edd9d265d79318f3e2ad314dabcab46c4855688472a016c30aafb9aa02ef56870126
-
SSDEEP
49152:0itOd4k7ydepSSPIZDscC+QZKDVdfu31h:0iK4IIZYfZKDVQFh
Malware Config
Signatures
-
Blocklisted process makes network request 11 IoCs
Processes:
cmd.exeflow pid process 14 2444 cmd.exe 16 2444 cmd.exe 17 2444 cmd.exe 18 2444 cmd.exe 20 2444 cmd.exe 22 2444 cmd.exe 24 2444 cmd.exe 25 2444 cmd.exe 26 2444 cmd.exe 27 2444 cmd.exe 28 2444 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
GetX64BTIT.exepid process 1320 GetX64BTIT.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2444 cmd.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 api.ipify.org 16 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\Tasks\cms.job cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1ef652cf753aac92977c2cfea7fe08c4.exenotepad.execmd.exepid process 2940 1ef652cf753aac92977c2cfea7fe08c4.exe 1888 notepad.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe 2444 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
notepad.exepid process 1888 notepad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cmd.exepid process 2444 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1ef652cf753aac92977c2cfea7fe08c4.exenotepad.exedescription pid process target process PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 2940 wrote to memory of 1888 2940 1ef652cf753aac92977c2cfea7fe08c4.exe notepad.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe PID 1888 wrote to memory of 2444 1888 notepad.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ef652cf753aac92977c2cfea7fe08c4.exe"C:\Users\Admin\AppData\Local\Temp\1ef652cf753aac92977c2cfea7fe08c4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"4⤵
- Executes dropped EXE
PID:1320
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD5ebc99b8fff3a6ff144ca58f73d2b9d7b
SHA19f2e6623fd0074cd3f9dbb59d184d32098d83133
SHA256a29526f00c9f0de050c7003624ddc94e1dd0419f16c99b328d67f073352ac535
SHA5129acc3b34348403ec74f2bb234f6f4853e771815fd517a573a6c6dcb9c73083d385fa16970e3953ee0b366716dbd012442cf1399d3064e0c5c2928dde72e7a198