Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
96678804a3e4e8f33683a6adcdc5c9b8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96678804a3e4e8f33683a6adcdc5c9b8.exe
Resource
win10v2004-20231222-en
General
-
Target
96678804a3e4e8f33683a6adcdc5c9b8.exe
-
Size
67KB
-
MD5
96678804a3e4e8f33683a6adcdc5c9b8
-
SHA1
b2f82499db57e990fd106c956bf07cf65264d415
-
SHA256
6fbbdfe4b8c6d7f06ec36f824c9af07fc853b7b355a3726e66c83bd673dd93c6
-
SHA512
199dd3f19596747499692d0a3e785f6793549ce02935b7a7212e1a0c1d35b8c7aa2754a912044a96aecb29a4b8f5d9fe7ead615e99e4f09fa706cc6fe0ee83f1
-
SSDEEP
1536:5OYV9aUjJucIQgu1vPIWE+b2SoJX1LNdAWNjtDTGUnqrsX:8URE+VoJX1LNdVVtOU6sX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3012 murzuja.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 icanhazip.com -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5000 wrote to memory of 3012 5000 96678804a3e4e8f33683a6adcdc5c9b8.exe 84 PID 5000 wrote to memory of 3012 5000 96678804a3e4e8f33683a6adcdc5c9b8.exe 84 PID 5000 wrote to memory of 3012 5000 96678804a3e4e8f33683a6adcdc5c9b8.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\96678804a3e4e8f33683a6adcdc5c9b8.exe"C:\Users\Admin\AppData\Local\Temp\96678804a3e4e8f33683a6adcdc5c9b8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\murzuja.exeC:\Users\Admin\AppData\Local\Temp\murzuja.exe2⤵
- Executes dropped EXE
PID:3012
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD548efa47599ca95e3cd6d4b3c877d0dc3
SHA12a478290814bd3608f089043351953ecc0480a0e
SHA256798635814b873567e04874a23135c85ae39c8d07f3498423b985d7c9bcd503e2
SHA5121485fc5d455f6469eeb6e86af38e1b695d4f3f0a73978585ee224592dbffd9778a2816073e0cdc311982e10d42c8275cadc7c1c780a07a5f4d425daf132199ae