Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-02-2024 15:31
Static task
static1
Behavioral task
behavioral1
Sample
925ade29ba8a19d8ee9c975f7a2e7b49.exe
Resource
win7-20231215-en
General
-
Target
925ade29ba8a19d8ee9c975f7a2e7b49.exe
-
Size
3.1MB
-
MD5
925ade29ba8a19d8ee9c975f7a2e7b49
-
SHA1
e77bd3fbb537215e4c932f1c1305cef2e275996f
-
SHA256
b73df585c4404f7d9336de13f727cb3b2245ed2eec4016b9925641f444bc4eab
-
SHA512
b1129b8e3b6b770fd8dace8cf67cfc8a6e968068f46772dd768efaccb7b42145ce5809936c945d2428c63b3a9471d054a8c3eee1aa4ad4ea45c20bc77d39ec7b
-
SSDEEP
49152:NitOd4k7ydepSSPIZDscC+QZKDVdfu31e:NiK4IIZYfZKDVQFe
Malware Config
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 11 2624 cmd.exe 14 2624 cmd.exe 16 2624 cmd.exe 17 2624 cmd.exe 18 2624 cmd.exe 19 2624 cmd.exe 20 2624 cmd.exe 22 2624 cmd.exe 23 2624 cmd.exe 24 2624 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 588 GetX64BTIT.exe -
Loads dropped DLL 1 IoCs
pid Process 2624 cmd.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 api.ipify.org 16 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\cms.job cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 2864 notepad.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2864 notepad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2624 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2496 wrote to memory of 2864 2496 925ade29ba8a19d8ee9c975f7a2e7b49.exe 28 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29 PID 2864 wrote to memory of 2624 2864 notepad.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\925ade29ba8a19d8ee9c975f7a2e7b49.exe"C:\Users\Admin\AppData\Local\Temp\925ade29ba8a19d8ee9c975f7a2e7b49.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"4⤵
- Executes dropped EXE
PID:588
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28B
MD5c8c7a18627647191ae9f08bb1c4d8613
SHA15980f943299308b5d5fb0ecf71733cafaf50ad8b
SHA256929ecb1c7f4781a1cbacfffe2573d51bfaa7dca626a6c40949f73d05919ee90f
SHA512bad66322ec1d4db191bd29a900396707f9a5814beec9b6a66d190b2083b6c3c9196f0a83e4a8d6ee0d89bd57d64b098280bf677371d9a7ec259c459b367b2d99
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e