Analysis
-
max time kernel
9s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 06:35
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.bat
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Launcher.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
compiler.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
compiler.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
lua51.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
lua51.dll
Resource
win10v2004-20240709-en
General
-
Target
Launcher.bat
-
Size
31B
-
MD5
41132bf2fe575a1b1e4c1504afe5324a
-
SHA1
2531a3b6534495510d727cfd179805b1eb68d7fe
-
SHA256
a6a10d3ad76f6ac73ddb8026cea7024523b67210cad1ff64e0deea00bbf54df5
-
SHA512
a5514a7a7749233d0c37c8d6be628ca3e5ac4e36a187fccda53569430eaa9723f704c0597f79dee5ddf1e507407ec087cf70cccd8fddcbedad50d6a6d1ed1b6a
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4728 wrote to memory of 3060 4728 cmd.exe 84 PID 4728 wrote to memory of 3060 4728 cmd.exe 84 PID 4728 wrote to memory of 3060 4728 cmd.exe 84