Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:13
Behavioral task
behavioral1
Sample
22a4e3fe84c4bb3e79b289ac053c77d1.exe
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
22a4e3fe84c4bb3e79b289ac053c77d1.exe
-
Size
1.9MB
-
MD5
22a4e3fe84c4bb3e79b289ac053c77d1
-
SHA1
7fe44f740fb2eaf7ffb85520e06e4149fa443d84
-
SHA256
f14c125600acad1e6aa330deb5aca520f3fa83e747d2e094d4a337e83b413da5
-
SHA512
86d6e0ac0613f33b47e59f2c8f9fa8d7bf34b3bfd41bb655e6fb39e133e7d4ee2183c95852edaf173a1e6a089943355c87f17a297672f07db5b56a422ecc769c
-
SSDEEP
24576:C3q4nvYveRLfRq3hwwy8nCAlmd/l/hAot8rhhUF54clNf7+6uHAW92zt/sWu2BSW:74nQe5qWGYlZA88to54clgLH+tkWJ0
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2200-0-0x0000000000300000-0x0000000000614000-memory.dmp vmprotect -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 2 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2200 22a4e3fe84c4bb3e79b289ac053c77d1.exe