Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-04-2024 21:39
Static task
static1
Behavioral task
behavioral1
Sample
5514d172f9de092b9a43a3c71e63847a25b354c474a8d5c29774a8d5762be461.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5514d172f9de092b9a43a3c71e63847a25b354c474a8d5c29774a8d5762be461.exe
Resource
win10v2004-20240426-en
General
-
Target
5514d172f9de092b9a43a3c71e63847a25b354c474a8d5c29774a8d5762be461.exe
-
Size
92KB
-
MD5
22a74e7b1caa9821c3f3831b1d007b89
-
SHA1
0f285cb884fd3a3fcdc417d736ec5a1423f3484f
-
SHA256
5514d172f9de092b9a43a3c71e63847a25b354c474a8d5c29774a8d5762be461
-
SHA512
29835d2013a503e4c1c92e8fe978d3a47b64ac80e300a0476c2da196eb9dd6a6ca77678a4103f2e108bc2ac997802f0ddde87fd3f119fabe744105690fe6a98d
-
SSDEEP
1536:0MA7W59lPYpBCvXkd/DKO7FcwY2fL9C4zxcSsxA4:tu0DYpBXDKO7FDYuL9C4Ix/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3332 olacweegim.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 checkip.dyndns.org -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1796 wrote to memory of 3332 1796 5514d172f9de092b9a43a3c71e63847a25b354c474a8d5c29774a8d5762be461.exe 84 PID 1796 wrote to memory of 3332 1796 5514d172f9de092b9a43a3c71e63847a25b354c474a8d5c29774a8d5762be461.exe 84 PID 1796 wrote to memory of 3332 1796 5514d172f9de092b9a43a3c71e63847a25b354c474a8d5c29774a8d5762be461.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5514d172f9de092b9a43a3c71e63847a25b354c474a8d5c29774a8d5762be461.exe"C:\Users\Admin\AppData\Local\Temp\5514d172f9de092b9a43a3c71e63847a25b354c474a8d5c29774a8d5762be461.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\olacweegim.exeC:\Users\Admin\AppData\Local\Temp\olacweegim.exe2⤵
- Executes dropped EXE
PID:3332
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5f8fe1c7f42e6d0582f0644a13725b858
SHA114a2432c300e5e495b77e50672b73be3dd0a2ae1
SHA2560e22f15db3ad23aa97d33daceb7cdf08b08ef9c132888fb814d2e653ca4dadc7
SHA5129e3699d6c5089f2779ae43cc4a04ee413ef2ad3f0b8a50e800341ebae939ec2a41b7feb5a13d83338888419b822315f2623b48d3861f7f3f65cb637fa10ccfd1