Resubmissions
09/08/2024, 00:46 UTC
240809-a4lkeaxcjd 106/08/2024, 17:35 UTC
240806-v56l7avfnr 101/08/2024, 21:24 UTC
240801-z89v8s1cjb 1Analysis
-
max time kernel
277s -
max time network
294s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 21:24 UTC
Static task
static1
Behavioral task
behavioral1
Sample
1.scr
Resource
win7-20240705-en
3 signatures
300 seconds
Behavioral task
behavioral2
Sample
1.scr
Resource
win10v2004-20240730-en
3 signatures
300 seconds
General
-
Target
1.scr
-
Size
371KB
-
MD5
29b8d499c4ae98d7107a28477b01c5e4
-
SHA1
3efa32d32c4b7cc88120008c79c380c3a0c80933
-
SHA256
6c641b4d5c5032270b712691c0b4fef9332601cfe2d7d6a07169fe410058f6ea
-
SHA512
533d672b77801b1a1e65d19cc1b32caa93a67ee58ecffd61adb586369805fe973f534bd37b5406e16a68014da963224e4dee3ddea8d2205ce6332d7ee4d1a94f
-
SSDEEP
6144:aWJEs8PunzXNHsWBElFoZurwEGgKaebh4eV0ljQ95a0EJ6UA:aWJz86TNHsW6lKZP8yhvuQ5vEO
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3608 1.scr 3608 1.scr -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3608 1.scr Token: SeImpersonatePrivilege 3608 1.scr Token: SeTakeOwnershipPrivilege 3608 1.scr -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3608 wrote to memory of 796 3608 1.scr 10 PID 3608 wrote to memory of 796 3608 1.scr 10 PID 3608 wrote to memory of 796 3608 1.scr 10
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\1.scr"C:\Users\Admin\AppData\Local\Temp\1.scr" /S1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3608
Network
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestblowjob-avenue.comIN AResponseblowjob-avenue.comIN A194.48.248.52
-
Remote address:194.48.248.52:80RequestPOST / HTTP/1.1
Connection: Keep-Alive
Accept-Encoding: gzip, deflate
User-Agent: Mozilla / 5.0 (Windows NT 10.0; rv: 1.0) Gecko / 19041 Sonderklasse / 1.0
Content-Length: 67
Host: blowjob-avenue.com
ResponseHTTP/1.1 200 OK
Date: Thu, 01 Aug 2024 21:24:50 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 68
-
Remote address:8.8.8.8:53Request52.248.48.194.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:194.48.248.52:80RequestPOST / HTTP/1.1
Connection: Keep-Alive
Accept-Encoding: gzip, deflate
User-Agent: Mozilla / 5.0 (Windows NT 10.0; rv: 1.0) Gecko / 19041 Sonderklasse / 1.0
Content-Length: 202
Host: blowjob-avenue.com
ResponseHTTP/1.1 200 OK
Date: Thu, 01 Aug 2024 21:29:22 GMT
Content-Type: text/plain; charset=utf-8
Content-Encoding: gzip
Content-Length: 251
Vary: Accept-Encoding
-
953 B 739 B 15 13
HTTP Request
POST http://blowjob-avenue.com/HTTP Response
200 -
721 B 690 B 7 6
HTTP Request
POST http://blowjob-avenue.com/HTTP Response
200
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
88.156.103.20.in-addr.arpa
-
64 B 80 B 1 1
DNS Request
blowjob-avenue.com
DNS Response
194.48.248.52
-
72 B 132 B 1 1
DNS Request
52.248.48.194.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa