Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
6e87920901733dfba325374f8efa34f2.exe
Resource
win7-20231215-en
General
-
Target
6e87920901733dfba325374f8efa34f2.exe
-
Size
444KB
-
MD5
6e87920901733dfba325374f8efa34f2
-
SHA1
ac2639d07fb721002265b91d23f44dece3c2ea79
-
SHA256
53aa312eac26534eb4c16c8aa3204d563d53bd9a35ff30e87befbe807425a15a
-
SHA512
960aca36f0fd8854ce90714eec559072cb73330658b9a5a7129fda692c4c352a1a99251759f9f3feff06aa04e46f8469a277cfa041a35bef797211a29097f534
-
SSDEEP
12288:sqiNL0Y/eQ2ZaOpTYP+Xjn+sX9eK+ySCs:sxNL0Y/ezauYP+FX9t+z1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1544 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 api.ipify.org 12 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe 3008 6e87920901733dfba325374f8efa34f2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3008 6e87920901733dfba325374f8efa34f2.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3008 wrote to memory of 1544 3008 6e87920901733dfba325374f8efa34f2.exe 91 PID 3008 wrote to memory of 1544 3008 6e87920901733dfba325374f8efa34f2.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e87920901733dfba325374f8efa34f2.exe"C:\Users\Admin\AppData\Local\Temp\6e87920901733dfba325374f8efa34f2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"2⤵
- Executes dropped EXE
PID:1544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD5da63be75dd7b13a6e17333fbb415c723
SHA17accaba5d1379388fd94dafeea3248d36c06050b
SHA25676fb601e8395fc60c2f01a0b003eb60bc2851196d645a0f7bfc005c50873f18b
SHA512087d9d9a6d5666824065177a2ee950431f77cb05f429f56433a7d3e2899671cfea55d4cac4f44c3eb8f64994dcc2a4182a13f071c45ff79b400250ff57688945