Malware Analysis Report

2024-11-13 13:22

Sample ID 240616-2v4s6sscja
Target Dox_Tool_V2.exe
SHA256 dfdb90a7d5e41b030bb8bae6f325688ff3d3b3b2da8c554c34e66dad86cebe90
Tags
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

dfdb90a7d5e41b030bb8bae6f325688ff3d3b3b2da8c554c34e66dad86cebe90

Threat Level: Likely benign

The file Dox_Tool_V2.exe was found to be: Likely benign.

Malicious Activity Summary


Unsigned PE

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-16 22:55

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-16 22:55

Reported

2024-06-16 23:02

Platform

win7-20240508-en

Max time kernel

120s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Dox_Tool_V2.exe"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dox_Tool_V2.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Dox_Tool_V2.exe

"C:\Users\Admin\AppData\Local\Temp\Dox_Tool_V2.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 drizzybot.com udp

Files

memory/1796-0-0x0000000074C6E000-0x0000000074C6F000-memory.dmp

memory/1796-1-0x0000000001280000-0x00000000012B2000-memory.dmp

memory/1796-2-0x0000000074C60000-0x000000007534E000-memory.dmp

memory/1796-3-0x0000000074C60000-0x000000007534E000-memory.dmp

memory/1796-4-0x0000000074C6E000-0x0000000074C6F000-memory.dmp

memory/1796-5-0x0000000074C60000-0x000000007534E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-16 22:55

Reported

2024-06-16 23:02

Platform

win10v2004-20240611-en

Max time kernel

115s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Dox_Tool_V2.exe"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dox_Tool_V2.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Dox_Tool_V2.exe

"C:\Users\Admin\AppData\Local\Temp\Dox_Tool_V2.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4352,i,16856304285138459032,14480077487839828721,262144 --variations-seed-version --mojo-platform-channel-handle=1036 /prefetch:8

Network

Country Destination Domain Proto
GB 87.248.205.0:80 tcp
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
BE 88.221.83.234:443 www.bing.com tcp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 234.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 drizzybot.com udp
US 104.21.66.166:80 drizzybot.com tcp
US 20.189.173.15:443 tcp
US 8.8.8.8:53 166.66.21.104.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp

Files

memory/4272-0-0x000000007539E000-0x000000007539F000-memory.dmp

memory/4272-1-0x0000000000150000-0x0000000000182000-memory.dmp

memory/4272-2-0x0000000004BA0000-0x0000000004C3C000-memory.dmp

memory/4272-3-0x00000000051F0000-0x0000000005794000-memory.dmp

memory/4272-4-0x0000000004C40000-0x0000000004CD2000-memory.dmp

memory/4272-5-0x0000000004B60000-0x0000000004B6A000-memory.dmp

memory/4272-6-0x0000000004D40000-0x0000000004D96000-memory.dmp

memory/4272-7-0x0000000075390000-0x0000000075B40000-memory.dmp

memory/4272-8-0x0000000075390000-0x0000000075B40000-memory.dmp

memory/4272-9-0x000000007539E000-0x000000007539F000-memory.dmp

memory/4272-10-0x0000000075390000-0x0000000075B40000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-16 22:55

Reported

2024-06-16 22:59

Platform

ubuntu1804-amd64-20240611-en

Max time kernel

0s

Command Line

[/tmp/Dox_Tool_V2.exe]

Signatures

N/A

Processes

/tmp/Dox_Tool_V2.exe

[/tmp/Dox_Tool_V2.exe]

Network

N/A

Files

N/A