Analysis
-
max time kernel
145s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-es -
resource tags
arch:x64arch:x86image:win10v2004-20240226-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
19/03/2024, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
4441Fact-45888355 - Detalles CJYZ5671 mar2024 Ref-UQKQ6297.exe
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
4441Fact-45888355 - Detalles CJYZ5671 mar2024 Ref-UQKQ6297.exe
Resource
win10v2004-20240226-es
General
-
Target
4441Fact-45888355 - Detalles CJYZ5671 mar2024 Ref-UQKQ6297.exe
-
Size
101.1MB
-
MD5
458bcc05eea5c79718f6a629476c7bdb
-
SHA1
68382f91f559a33cffd88dddf495a8244003f7da
-
SHA256
4ea28a26268a7b7ce7299705d424fef1c778f03a1984818030a5dee2c222bc6b
-
SHA512
227387e7598503fba2db92d594bbef860ba6499f2e6f9de25414b5cbced5c69b9bef82584d7a2d1cf2b748194470b9077d055917d5dad6ae9b3ef833b28e1b1f
-
SSDEEP
49152:ttUulh46ON9l/SyTtySXJ0HhOeWplfCVvmLYy5nTjLQ3Rcd4aX:tt7eXHJEOeWiG5nc3a
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 45 ip-api.com -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4216 4441Fact-45888355 - Detalles CJYZ5671 mar2024 Ref-UQKQ6297.exe 4216 4441Fact-45888355 - Detalles CJYZ5671 mar2024 Ref-UQKQ6297.exe 4216 4441Fact-45888355 - Detalles CJYZ5671 mar2024 Ref-UQKQ6297.exe 4216 4441Fact-45888355 - Detalles CJYZ5671 mar2024 Ref-UQKQ6297.exe 4216 4441Fact-45888355 - Detalles CJYZ5671 mar2024 Ref-UQKQ6297.exe 4216 4441Fact-45888355 - Detalles CJYZ5671 mar2024 Ref-UQKQ6297.exe