Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-03-2024 13:30

General

  • Target

    b4d051eb4e505340638048ae8ada9899.exe

  • Size

    3.1MB

  • MD5

    b4d051eb4e505340638048ae8ada9899

  • SHA1

    fadd88fad71647894d3aa76010c6606a60388f23

  • SHA256

    d03ba24ab70fa01053ef1b27420a0585540d371702c06332bfa1c7fb8999574d

  • SHA512

    cdd13f5b6fe6193effa755115685b0df1e2c2003d781e05a93a5b05750a9818a3ff00763fe25e52f8bf60e4006718dc80f203e0705772c6df56e4443762dc8d9

  • SSDEEP

    49152:qitOd4k7ydepSSPIZDscC+QZKDVdfu31r:qiK4IIZYfZKDVQFr

Score
10/10

Malware Config

Signatures

  • Blocklisted process makes network request 25 IoCs
  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4d051eb4e505340638048ae8ada9899.exe
    "C:\Users\Admin\AppData\Local\Temp\b4d051eb4e505340638048ae8ada9899.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\system32\notepad.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2016
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1468
        • C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe
          "C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"
          4⤵
          • Executes dropped EXE
          PID:4288

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe
    Filesize

    3KB

    MD5

    b4cd27f2b37665f51eb9fe685ec1d373

    SHA1

    7f08febf0fdb7fc9f8bf35a10fb11e7de431abe0

    SHA256

    91f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581

    SHA512

    e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e

  • C:\Users\Admin\AppData\Local\Temp\x64btit.txt
    Filesize

    28B

    MD5

    c12e7e89646953cb07d17ab1d2ebe5b3

    SHA1

    3552baba3ebeda91f981b78a567f34f7d23491a3

    SHA256

    039f82b435c5e2ed29c5158ec8ea8b2bf57e84014bbffe8951a447ba763564fc

    SHA512

    953f43d30f3fb916523116b61ac138669653c50de116b50c66009aefbc8e332033b06d9913cc3c89699af13d988e377771c43228d64eda8dddaf031b5cabe072

  • memory/1192-0-0x0000000002870000-0x0000000002871000-memory.dmp
    Filesize

    4KB

  • memory/1192-1-0x00000000028A0000-0x00000000028AA000-memory.dmp
    Filesize

    40KB

  • memory/1192-3-0x0000000000400000-0x0000000000738000-memory.dmp
    Filesize

    3.2MB

  • memory/1192-4-0x0000000002870000-0x0000000002871000-memory.dmp
    Filesize

    4KB

  • memory/1192-6-0x00000000028A0000-0x00000000028AA000-memory.dmp
    Filesize

    40KB

  • memory/1468-23-0x0000000000400000-0x000000000049F000-memory.dmp
    Filesize

    636KB

  • memory/1468-36-0x0000000000400000-0x000000000049F000-memory.dmp
    Filesize

    636KB

  • memory/1468-11-0x0000000000400000-0x000000000049F000-memory.dmp
    Filesize

    636KB

  • memory/1468-12-0x0000000000400000-0x000000000049F000-memory.dmp
    Filesize

    636KB

  • memory/1468-13-0x0000000001310000-0x0000000001318000-memory.dmp
    Filesize

    32KB

  • memory/1468-14-0x00007FFA202B0000-0x00007FFA204A5000-memory.dmp
    Filesize

    2.0MB

  • memory/1468-43-0x0000000000400000-0x000000000049F000-memory.dmp
    Filesize

    636KB

  • memory/1468-41-0x0000000000400000-0x000000000049F000-memory.dmp
    Filesize

    636KB

  • memory/1468-24-0x0000000000400000-0x000000000049F000-memory.dmp
    Filesize

    636KB

  • memory/1468-25-0x0000000000400000-0x000000000049F000-memory.dmp
    Filesize

    636KB

  • memory/1468-26-0x0000000000400000-0x000000000049F000-memory.dmp
    Filesize

    636KB

  • memory/1468-27-0x0000000000400000-0x000000000049F000-memory.dmp
    Filesize

    636KB

  • memory/1468-28-0x0000000000400000-0x000000000049F000-memory.dmp
    Filesize

    636KB

  • memory/1468-38-0x0000000000400000-0x000000000049F000-memory.dmp
    Filesize

    636KB

  • memory/1468-37-0x0000000000400000-0x000000000049F000-memory.dmp
    Filesize

    636KB

  • memory/1468-35-0x0000000000400000-0x000000000049F000-memory.dmp
    Filesize

    636KB

  • memory/2016-9-0x00007FFA202B0000-0x00007FFA204A5000-memory.dmp
    Filesize

    2.0MB

  • memory/2016-2-0x0000000000E80000-0x0000000000E82000-memory.dmp
    Filesize

    8KB

  • memory/2016-7-0x0000000002990000-0x0000000002998000-memory.dmp
    Filesize

    32KB

  • memory/2016-8-0x0000000005000000-0x0000000005084000-memory.dmp
    Filesize

    528KB

  • memory/2016-19-0x0000000005000000-0x0000000005084000-memory.dmp
    Filesize

    528KB