Analysis
-
max time kernel
152s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 06:07
Static task
static1
Behavioral task
behavioral1
Sample
42f25d8b16c1f6e6816c16d5200d09f4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42f25d8b16c1f6e6816c16d5200d09f4.exe
Resource
win10v2004-20231215-en
General
-
Target
42f25d8b16c1f6e6816c16d5200d09f4.exe
-
Size
101KB
-
MD5
42f25d8b16c1f6e6816c16d5200d09f4
-
SHA1
12d31cd7b317c8dfb81f042ad29cc38456486c2b
-
SHA256
e1641ea6d6652d726900216b94dd17ad59127879bd6de37bed55b8d9005049d0
-
SHA512
2f0ef3203e395b791093a300596fd3d69ce554e7ac8ad5589ed7ec1973d2a28716a034b18b73f9f066075953d2ef2bbf606d8850678e175882768220dfd0b4de
-
SSDEEP
1536:6ewZnxbj25f+rPfK5kL9EhuVshhyXT5YXRtqcspaDwx1pP:DwBxbCB+DR9RV35YXRnspIG1x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 976 vadftol.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 48 icanhazip.com -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1252 wrote to memory of 976 1252 42f25d8b16c1f6e6816c16d5200d09f4.exe 43 PID 1252 wrote to memory of 976 1252 42f25d8b16c1f6e6816c16d5200d09f4.exe 43 PID 1252 wrote to memory of 976 1252 42f25d8b16c1f6e6816c16d5200d09f4.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\42f25d8b16c1f6e6816c16d5200d09f4.exe"C:\Users\Admin\AppData\Local\Temp\42f25d8b16c1f6e6816c16d5200d09f4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\vadftol.exeC:\Users\Admin\AppData\Local\Temp\vadftol.exe2⤵
- Executes dropped EXE
PID:976
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5d434a26d20cb1d1d5c3e7b7bc27cb9c9
SHA15c6c4d49e54f5b1101cc2b2b47eddca057460c87
SHA256ffc85b90d2e9afbe4eef8bbef177111f9282a54032d1837b6d67fa21d44c3d15
SHA512bdb253d902963e99ffba7035c3c90385cdb23702bfcff15b4c26ec5fdc9e7e5a9df96e66a15549572bc218bf4e8fe8e08911b4836116c8e4926a097d37aca97a
-
Filesize
49KB
MD5efcbeb7fdcc81e63b613e1b0fd05ea8c
SHA117449efbf1d94c8b00e623e2e7161ba33a8b55c2
SHA256a1464c2902dd6d902a6caacade2777655f1f7c39a81d3fafde3c6ec14388b4b7
SHA512f72a57e29f000e14b4447e81ebd1c21b310942484a1c8d3247b1ec4170ef5097d635a295d160410b555db97a082f12586aac0184f0083cf437c5710070918436