Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-01-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
6e87920901733dfba325374f8efa34f2.exe
Resource
win7-20231215-en
General
-
Target
6e87920901733dfba325374f8efa34f2.exe
-
Size
444KB
-
MD5
6e87920901733dfba325374f8efa34f2
-
SHA1
ac2639d07fb721002265b91d23f44dece3c2ea79
-
SHA256
53aa312eac26534eb4c16c8aa3204d563d53bd9a35ff30e87befbe807425a15a
-
SHA512
960aca36f0fd8854ce90714eec559072cb73330658b9a5a7129fda692c4c352a1a99251759f9f3feff06aa04e46f8469a277cfa041a35bef797211a29097f534
-
SSDEEP
12288:sqiNL0Y/eQ2ZaOpTYP+Xjn+sX9eK+ySCs:sxNL0Y/ezauYP+FX9t+z1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2504 GetX64BTIT.exe -
Loads dropped DLL 1 IoCs
pid Process 2512 6e87920901733dfba325374f8efa34f2.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 4 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe 2512 6e87920901733dfba325374f8efa34f2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2512 6e87920901733dfba325374f8efa34f2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2504 2512 6e87920901733dfba325374f8efa34f2.exe 28 PID 2512 wrote to memory of 2504 2512 6e87920901733dfba325374f8efa34f2.exe 28 PID 2512 wrote to memory of 2504 2512 6e87920901733dfba325374f8efa34f2.exe 28 PID 2512 wrote to memory of 2504 2512 6e87920901733dfba325374f8efa34f2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e87920901733dfba325374f8efa34f2.exe"C:\Users\Admin\AppData\Local\Temp\6e87920901733dfba325374f8efa34f2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"2⤵
- Executes dropped EXE
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD53b757592521e331d68560b049355ef2c
SHA18ec62acc489ab1a5a206532f3d4c6a2d3f5bf765
SHA25665f60df0970f94e3bc54325b9a683905d49ee98a473843caedde267923f53cdc
SHA512d81079d046dbacfd69e1f9f31f5b1a669302ce91bd1fcf8a70359251bd0fb435d47469b788756c3753bde8c60392715dde5995c8c362b0abb7cae152d2e3f85f