Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 18:58 UTC

General

  • Target

    d4b0cc69b0f59b89aa6b5eca4a30526b07c091a4fe0279d0a6e140e779e9f0ccN.exe

  • Size

    75KB

  • MD5

    de390e47a6cee477ad76e4ff0f20c1f0

  • SHA1

    0ef6ded4deda1bb1fb7c5459866f263d48839b82

  • SHA256

    d4b0cc69b0f59b89aa6b5eca4a30526b07c091a4fe0279d0a6e140e779e9f0cc

  • SHA512

    7afd100f47c9cc8b00011f3428650e18b0542dd359f28093eb4c125c824311b598d0feff1db991f98ecc7f88f9c1f3170615f8c53492f3f9c611cc45f335ffe1

  • SSDEEP

    1536:UyqAXcrg4uQHPSC/+C4O1xLXuGNl7DDhlQeU79WwxF3Wp:U3B/+UxLXuGNlHDhpUkwSp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4b0cc69b0f59b89aa6b5eca4a30526b07c091a4fe0279d0a6e140e779e9f0ccN.exe
    "C:\Users\Admin\AppData\Local\Temp\d4b0cc69b0f59b89aa6b5eca4a30526b07c091a4fe0279d0a6e140e779e9f0ccN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Users\Admin\AppData\Local\Temp\murzuja.exe
      C:\Users\Admin\AppData\Local\Temp\murzuja.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:756

Network

  • flag-us
    DNS
    13.86.106.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.86.106.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    140.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    140.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    209.205.72.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    209.205.72.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    icanhazip.com
    murzuja.exe
    Remote address:
    8.8.8.8:53
    Request
    icanhazip.com
    IN A
    Response
    icanhazip.com
    IN A
    104.16.184.241
    icanhazip.com
    IN A
    104.16.185.241
  • flag-us
    GET
    http://icanhazip.com/
    murzuja.exe
    Remote address:
    104.16.184.241:80
    Request
    GET / HTTP/1.1
    Accept: text/*, application/*
    User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.34 (KHTML, like Gecko) Chrome/43.0.2457.82 Safari/537.34
    Host: icanhazip.com
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Date: Sat, 28 Sep 2024 18:59:29 GMT
    Content-Type: text/plain
    Content-Length: 14
    Connection: keep-alive
    Access-Control-Allow-Origin: *
    Access-Control-Allow-Methods: GET
    Set-Cookie: __cf_bm=H_fTo02FtksNcaYuJmXh6kZf6_YqDF_gGUcvwHGM0w8-1727549969-1.0.1.1-tJszKZXNNPyGevgxO80uDR8NraJZ8kcFVz4xgH4HwRtX.aCfBCduboyTLpi45ZOEMjggL2FINbDy1sd3ADiESQ; path=/; expires=Sat, 28-Sep-24 19:29:29 GMT; domain=.icanhazip.com; HttpOnly
    Server: cloudflare
    CF-RAY: 8ca5f88ca9b063f5-LHR
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    86.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    241.184.16.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.184.16.104.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    100.209.201.84.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    100.209.201.84.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    69.209.201.84.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    69.209.201.84.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    19.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    19.229.111.52.in-addr.arpa
    IN PTR
    Response
  • 104.16.184.241:80
    http://icanhazip.com/
    http
    murzuja.exe
    394 B
    638 B
    4
    3

    HTTP Request

    GET http://icanhazip.com/

    HTTP Response

    200
  • 38.65.142.12:12500
    murzuja.exe
    156 B
    3
  • 24.220.92.193:443
    murzuja.exe
    260 B
    5
  • 24.220.92.193:443
    murzuja.exe
    260 B
    5
  • 176.36.251.208:443
    murzuja.exe
    260 B
    5
  • 176.36.251.208:443
    murzuja.exe
    260 B
    5
  • 173.216.240.56:443
    murzuja.exe
    52 B
    1
  • 8.8.8.8:53
    13.86.106.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    13.86.106.20.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    140.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    140.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    209.205.72.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    209.205.72.20.in-addr.arpa

  • 8.8.8.8:53
    icanhazip.com
    dns
    murzuja.exe
    59 B
    91 B
    1
    1

    DNS Request

    icanhazip.com

    DNS Response

    104.16.184.241
    104.16.185.241

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    86.23.85.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    86.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    241.184.16.104.in-addr.arpa
    dns
    73 B
    135 B
    1
    1

    DNS Request

    241.184.16.104.in-addr.arpa

  • 8.8.8.8:53
    100.209.201.84.in-addr.arpa
    dns
    73 B
    133 B
    1
    1

    DNS Request

    100.209.201.84.in-addr.arpa

  • 8.8.8.8:53
    69.209.201.84.in-addr.arpa
    dns
    72 B
    132 B
    1
    1

    DNS Request

    69.209.201.84.in-addr.arpa

  • 8.8.8.8:53
    19.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    19.229.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\murzuja.exe

    Filesize

    75KB

    MD5

    471f88996de7ece87c713cac95c9e220

    SHA1

    75941d2a8e6b24a20190db30aa77756fcda9c010

    SHA256

    123e52126b04d971a1d10347e1f7a7c11e2a53e900daa0ce6e93e117e0d7f8ba

    SHA512

    75db4aad23c47a451f13f60bc435ba6f0e07d1ddcf11b2151d191585b2e509653f3f1e5edef2e36bac0acf9b763f888ad25d9520036fa6a3a82f8de2749e56de

  • memory/756-5-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/756-6-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3700-0-0x0000000000401000-0x0000000000404000-memory.dmp

    Filesize

    12KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.