Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 00:01
Static task
static1
Behavioral task
behavioral1
Sample
07de8d93ec7190afee1eb569dce09bae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07de8d93ec7190afee1eb569dce09bae.exe
Resource
win10v2004-20231215-en
General
-
Target
07de8d93ec7190afee1eb569dce09bae.exe
-
Size
3.1MB
-
MD5
07de8d93ec7190afee1eb569dce09bae
-
SHA1
ef0b072fcf7f00184471589a6e4a0d3bd09b9553
-
SHA256
12dc9ca2e6b5e7c547ebd3814953c4e2aa0d1eb726877151b09494ab6a0c07bd
-
SHA512
a8d226bd9c8c0a8d6f856a9ef5ef8d235ca1e1c67c250d0f0bd043ae400f61b3dd7f1032c3278178d783edec343ba5a3870f1b753079f0d16a7955cdb57670ac
-
SSDEEP
49152:nitOd4k7ydepSSPIZDscC+QZKDVdfu31W:niK4IIZYfZKDVQFW
Malware Config
Signatures
-
Blocklisted process makes network request 9 IoCs
Processes:
cmd.exeflow pid process 10 2544 cmd.exe 12 2544 cmd.exe 13 2544 cmd.exe 14 2544 cmd.exe 16 2544 cmd.exe 18 2544 cmd.exe 20 2544 cmd.exe 21 2544 cmd.exe 22 2544 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
GetX64BTIT.exepid process 1752 GetX64BTIT.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2544 cmd.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 api.ipify.org 12 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\Tasks\cms.job cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
07de8d93ec7190afee1eb569dce09bae.exenotepad.execmd.exepid process 2184 07de8d93ec7190afee1eb569dce09bae.exe 3036 notepad.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
notepad.exepid process 3036 notepad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cmd.exepid process 2544 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
07de8d93ec7190afee1eb569dce09bae.exenotepad.exedescription pid process target process PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 2184 wrote to memory of 3036 2184 07de8d93ec7190afee1eb569dce09bae.exe notepad.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe PID 3036 wrote to memory of 2544 3036 notepad.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07de8d93ec7190afee1eb569dce09bae.exe"C:\Users\Admin\AppData\Local\Temp\07de8d93ec7190afee1eb569dce09bae.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"4⤵
- Executes dropped EXE
PID:1752
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28B
MD57ad4dc61b8b3dfcebe9741190b3fd4fa
SHA13840b22d40a1ee95fc61aadff831cb30c1b80df4
SHA2568967fa5b04d149697539716db8ba0268bb3f0e6eac924b4c3398a5767fe61a92
SHA512fa7dbfb0372123a04a4255fc0401bede663fa7a5ca3b72c165983b91c7b579973e1be46db3a18e3d6c72ca869c305fb749bd1550996f9d85474a4739bd9efb3e
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e