Resubmissions
03/07/2024, 11:55
240703-n3eblasbmf 603/07/2024, 11:47
240703-nya4da1fqa 624/06/2024, 09:08
240624-k4bqbavbqf 6Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe
Resource
win10v2004-20240611-en
General
-
Target
f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe
-
Size
5.0MB
-
MD5
d460bb3fb4b3aa150b7f7d0fae0fc9e5
-
SHA1
277435044e6219200a8c72bea1a3d2cd2eff291b
-
SHA256
f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0
-
SHA512
e77c39cd95fbba29baf9c6e7ba593830d6881f8d537ba36b07ebe333b4abcf10697755815ae30970dc29911291737e9c5b4d51e88f0ac349971a1653aab107f0
-
SSDEEP
98304:Uh4WPtUlGKtV58B7Pg1iX24Y5YZZqPnhIX4Pla6pMsA6H+nDsM/:UJ1Ul1tLwyiX2nYqPn6ytpzhysM
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 48 ipinfo.io 49 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3708 f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe 3708 f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3708 f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe 3708 f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3708 wrote to memory of 1776 3708 f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe 96 PID 3708 wrote to memory of 1776 3708 f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe 96 PID 3708 wrote to memory of 1776 3708 f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe 96 PID 1776 wrote to memory of 636 1776 cmd.exe 98 PID 1776 wrote to memory of 636 1776 cmd.exe 98 PID 1776 wrote to memory of 636 1776 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe"C:\Users\Admin\AppData\Local\Temp\f46b9aeafe296ebbad909e927fad26a21b05fbbc68cb446299c224fd27ea7fb0.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c tzutil /g2⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\tzutil.exetzutil /g3⤵PID:636
-
-