Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
cc629e5d6fabb0da8f46ecb5d667113d.exe
Resource
win7-20240221-en
General
-
Target
cc629e5d6fabb0da8f46ecb5d667113d.exe
-
Size
3.1MB
-
MD5
cc629e5d6fabb0da8f46ecb5d667113d
-
SHA1
ce1084782c077756fb43a1056cfcfdd80182f54e
-
SHA256
c0503c54556ba129ef04f224cec3c985e7d17f7e39a4574cbd553a67902ec689
-
SHA512
c54ca9ed01b007fc4abc0d72c77253ac2d8802882841a43226764b1fd46e4a1873158d04b396c3b82381fa806abc27cfb6b7778668c656afa53afc6d7c539a4a
-
SSDEEP
49152:jitOd4k7ydepSSPIZDscC+QZKDVdfu315:jiK4IIZYfZKDVQF5
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
Processes:
cmd.exeflow pid process 8 2780 cmd.exe 10 2780 cmd.exe 11 2780 cmd.exe 12 2780 cmd.exe 14 2780 cmd.exe 15 2780 cmd.exe 16 2780 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
GetX64BTIT.exepid process 1520 GetX64BTIT.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2780 cmd.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 api.ipify.org 10 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\Tasks\cms.job cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
cc629e5d6fabb0da8f46ecb5d667113d.exenotepad.execmd.exepid process 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe 2240 notepad.exe 2240 notepad.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe 2780 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
notepad.exepid process 2240 notepad.exe 2240 notepad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cmd.exepid process 2780 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cc629e5d6fabb0da8f46ecb5d667113d.exenotepad.exedescription pid process target process PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2804 wrote to memory of 2240 2804 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 2240 wrote to memory of 2192 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2192 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2192 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2192 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2192 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2192 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2192 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2192 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2192 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2192 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe PID 2240 wrote to memory of 2780 2240 notepad.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc629e5d6fabb0da8f46ecb5d667113d.exe"C:\Users\Admin\AppData\Local\Temp\cc629e5d6fabb0da8f46ecb5d667113d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:2192
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"4⤵
- Executes dropped EXE
PID:1520
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28B
MD5eb9faa37247a895096d5587effc924ad
SHA13347a9617ee6ae066e719f99503ca3e6c05ca021
SHA256cee29eb86cadae993516079be3a72e568f43acd139b11e400f0bc34c70cebe8a
SHA5127e366a0330627b83812c42ff726cafaf5c8488be203c1c754df73402a6c3e46ab49f47785623bcc570b41b757347f21e94895071a4fae095d46c115c8099ca9f
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e