Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2024 09:24
Static task
static1
Behavioral task
behavioral1
Sample
91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe
Resource
win10v2004-20240709-en
General
-
Target
91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe
-
Size
2.1MB
-
MD5
d9f3d94487050486fc7e36fb436c4429
-
SHA1
d94e38d51f9c0a9ce90d95cb386a611b51644d12
-
SHA256
91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0
-
SHA512
d27da9a57a017383dfca8485c7c70652ea8a7544b40c9595b7f6b24186fc5c17b7b008283fdd5205ff872d8e043f1658c62871af24d0b51f6a7571d01c7503d8
-
SSDEEP
49152:tk8BMMcyO4uzNJbIdNJbnwpIHLVRGH5ccLH1i:SasZ4uJJb6U6VRGH5h
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 myexternalip.com -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exedescription pid process target process PID 1720 wrote to memory of 2528 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 2528 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 2528 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 4880 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 4880 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 4880 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 224 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 224 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 224 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 372 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 372 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 372 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 1592 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 1592 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 1592 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 1548 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 1548 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 1548 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 3692 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 3692 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 3692 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 760 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 760 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 760 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 3288 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 3288 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 3288 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 4224 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 4224 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe PID 1720 wrote to memory of 4224 1720 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe 91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"2⤵PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"2⤵PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"2⤵PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"2⤵PID:372
-
-
C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"2⤵PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"2⤵PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"2⤵PID:3692
-
-
C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"2⤵PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"2⤵PID:3288
-
-
C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"C:\Users\Admin\AppData\Local\Temp\91cad120d25935177fa0b719c2ad17f692fe670b906ff2acb051d88c553acca0.exe"2⤵PID:4224
-