Resubmissions
03/07/2024, 11:55
240703-n3eblasbmf 603/07/2024, 11:47
240703-nya4da1fqa 624/06/2024, 09:08
240624-k4bqbavbqf 6Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 09:08
Static task
static1
Behavioral task
behavioral1
Sample
f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe
Resource
win10v2004-20240508-en
General
-
Target
f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe
-
Size
5.0MB
-
MD5
d460bb3fb4b3aa150b7f7d0fae0fc9e5
-
SHA1
277435044e6219200a8c72bea1a3d2cd2eff291b
-
SHA256
f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0
-
SHA512
e77c39cd95fbba29baf9c6e7ba593830d6881f8d537ba36b07ebe333b4abcf10697755815ae30970dc29911291737e9c5b4d51e88f0ac349971a1653aab107f0
-
SSDEEP
98304:Uh4WPtUlGKtV58B7Pg1iX24Y5YZZqPnhIX4Pla6pMsA6H+nDsM/:UJ1Ul1tLwyiX2nYqPn6ytpzhysM
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4436 f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe 4436 f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4436 f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe 4436 f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4436 wrote to memory of 636 4436 f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe 88 PID 4436 wrote to memory of 636 4436 f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe 88 PID 4436 wrote to memory of 636 4436 f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe 88 PID 636 wrote to memory of 5104 636 cmd.exe 90 PID 636 wrote to memory of 5104 636 cmd.exe 90 PID 636 wrote to memory of 5104 636 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe"C:\Users\Admin\AppData\Local\Temp\f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c tzutil /g2⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\tzutil.exetzutil /g3⤵PID:5104
-
-