Resubmissions
02-04-2024 02:51
240402-dcgc6aee6z 1002-04-2024 02:51
240402-db6xesfa29 1002-04-2024 02:49
240402-da7gkaee21 1002-04-2024 02:48
240402-daq5kseh73 1002-04-2024 02:14
240402-cn2mssec25 1019-12-2023 13:11
231219-qe316abbcr 10Analysis
-
max time kernel
1200s -
max time network
1143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-04-2024 02:49
Static task
static1
General
-
Target
2e8f4deb77b157067ae01fafb05c2605.exe
-
Size
444KB
-
MD5
2e8f4deb77b157067ae01fafb05c2605
-
SHA1
093c3d4965df93063f20bd6c5e0951b267e74daf
-
SHA256
f868ca3de0e202d0b2e9dffb9d9cc7f668f91cbe7a397cad6d951c7063ad1b68
-
SHA512
808dbffe05a7f4805d1f0d162e0251f86af94655db403533eb906cd5951abfec25f9574a914770fd4374f82de7b9dc8eec5997f649a13a156837adadb8d87344
-
SSDEEP
12288:sqiNL0Y/eQ2ZaOpTYP+Xjn+sX9eK+ySCm:sxNL0Y/ezauYP+FX9t+zv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1296 GetX64BTIT.exe -
Loads dropped DLL 1 IoCs
pid Process 2044 2e8f4deb77b157067ae01fafb05c2605.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 4 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe 2044 2e8f4deb77b157067ae01fafb05c2605.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2044 2e8f4deb77b157067ae01fafb05c2605.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1296 2044 2e8f4deb77b157067ae01fafb05c2605.exe 30 PID 2044 wrote to memory of 1296 2044 2e8f4deb77b157067ae01fafb05c2605.exe 30 PID 2044 wrote to memory of 1296 2044 2e8f4deb77b157067ae01fafb05c2605.exe 30 PID 2044 wrote to memory of 1296 2044 2e8f4deb77b157067ae01fafb05c2605.exe 30 PID 2044 wrote to memory of 2416 2044 2e8f4deb77b157067ae01fafb05c2605.exe 23
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\2e8f4deb77b157067ae01fafb05c2605.exe"C:\Users\Admin\AppData\Local\Temp\2e8f4deb77b157067ae01fafb05c2605.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"2⤵
- Executes dropped EXE
PID:1296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD5e512dcf8fd2375d7debc8e1a37882918
SHA18a67ba41a3ec304b5137ecc70c0f34fd58be9f3c
SHA256458a2ed3e4d5c26d80a417cbb5f82aa5ba7e7670bacb645beef0f1c1691e4fc0
SHA5121e8ef33f2fd0d073c6a0d3a4d5ad506e165f0d47e6a559e4157ee236ad988fbbd2eed6fe273953d81e5b89b6161cc8a99c8a2daf7a716d77665c109e0123f1c8