Analysis
-
max time kernel
164s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2024 04:09
Static task
static1
Behavioral task
behavioral1
Sample
cc629e5d6fabb0da8f46ecb5d667113d.exe
Resource
win7-20240221-en
General
-
Target
cc629e5d6fabb0da8f46ecb5d667113d.exe
-
Size
3.1MB
-
MD5
cc629e5d6fabb0da8f46ecb5d667113d
-
SHA1
ce1084782c077756fb43a1056cfcfdd80182f54e
-
SHA256
c0503c54556ba129ef04f224cec3c985e7d17f7e39a4574cbd553a67902ec689
-
SHA512
c54ca9ed01b007fc4abc0d72c77253ac2d8802882841a43226764b1fd46e4a1873158d04b396c3b82381fa806abc27cfb6b7778668c656afa53afc6d7c539a4a
-
SSDEEP
49152:jitOd4k7ydepSSPIZDscC+QZKDVdfu315:jiK4IIZYfZKDVQF5
Malware Config
Signatures
-
Blocklisted process makes network request 25 IoCs
Processes:
cmd.exeflow pid process 130 4320 cmd.exe 132 4320 cmd.exe 166 4320 cmd.exe 168 4320 cmd.exe 169 4320 cmd.exe 171 4320 cmd.exe 174 4320 cmd.exe 175 4320 cmd.exe 176 4320 cmd.exe 177 4320 cmd.exe 178 4320 cmd.exe 179 4320 cmd.exe 180 4320 cmd.exe 181 4320 cmd.exe 182 4320 cmd.exe 183 4320 cmd.exe 184 4320 cmd.exe 185 4320 cmd.exe 187 4320 cmd.exe 188 4320 cmd.exe 189 4320 cmd.exe 191 4320 cmd.exe 192 4320 cmd.exe 193 4320 cmd.exe 195 4320 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
GetX64BTIT.exepid process 4540 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 166 api.ipify.org 165 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\Tasks\cms.job cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
cc629e5d6fabb0da8f46ecb5d667113d.exenotepad.execmd.exepid process 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe 180 notepad.exe 180 notepad.exe 180 notepad.exe 180 notepad.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe 4320 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
notepad.exepid process 180 notepad.exe 180 notepad.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 1132 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cmd.exepid process 4320 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cc629e5d6fabb0da8f46ecb5d667113d.exedescription pid process target process PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe PID 1136 wrote to memory of 180 1136 cc629e5d6fabb0da8f46ecb5d667113d.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc629e5d6fabb0da8f46ecb5d667113d.exe"C:\Users\Admin\AppData\Local\Temp\cc629e5d6fabb0da8f46ecb5d667113d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:180 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:2572
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"4⤵
- Executes dropped EXE
PID:4540
-
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4312
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD5fbd46e4a6637c73b315bba52db5248d3
SHA1580d80077003d678172e449cec4d2f7c2a8ebc70
SHA256e76e9d49766575c15814730956c7a3a7572cf80c2411b28961bb3902fc2da2fe
SHA51283aa3850251c8d92936baf9a4687417b307fdc207495dd52fbf921db16634fbdda660157b0a14a7c835101be429fada29e491646b439e35037a7d533c700ce47