Analysis Overview
SHA256
b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65a
Threat Level: Shows suspicious behavior
The file b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN was found to be: Shows suspicious behavior.
Malicious Activity Summary
Executes dropped EXE
Deletes itself
Loads dropped DLL
UPX packed file
Unsigned PE
System Location Discovery: System Language Discovery
Suspicious behavior: RenamesItself
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-07 10:36
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-07 10:36
Reported
2024-11-07 10:38
Platform
win7-20240903-en
Max time kernel
119s
Max time network
120s
Command Line
Signatures
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe
"C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe"
C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe
C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | cutit.org | udp |
| US | 172.232.25.148:443 | cutit.org | tcp |
| US | 172.232.25.148:443 | cutit.org | tcp |
| US | 172.232.25.148:443 | cutit.org | tcp |
| US | 172.232.25.148:443 | cutit.org | tcp |
| US | 8.8.8.8:53 | q.gs | udp |
| US | 172.67.193.84:80 | q.gs | tcp |
| US | 8.8.8.8:53 | publisher.linkvertise.com | udp |
| US | 104.22.23.72:443 | publisher.linkvertise.com | tcp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| GB | 142.250.187.227:80 | c.pki.goog | tcp |
| US | 8.8.8.8:53 | linkvertise.com | udp |
| US | 104.22.23.72:443 | linkvertise.com | tcp |
| US | 8.8.8.8:53 | crl.microsoft.com | udp |
| GB | 2.19.117.18:80 | crl.microsoft.com | tcp |
Files
memory/2052-10-0x00000000021F0000-0x000000000244A000-memory.dmp
memory/2052-7-0x0000000000400000-0x0000000000D9E000-memory.dmp
memory/2052-0-0x0000000000400000-0x0000000000605000-memory.dmp
\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe
| MD5 | d23df225b88ea1dc913fbf1bb508ce99 |
| SHA1 | 79fb699f932a34609b344f3ad9d9bca36333e750 |
| SHA256 | dcb8623d31bef39e5098bfca717690f30fc791e7483097889b2ef095dd97297d |
| SHA512 | dfead1be5e61f0ba249f7a220113326ba5ee84bbe3516802d68f1fdfe6472b6edbd539c3889e3cfbb7ca22f0f538b1084e9a12fe40eb58aad45cd9eccab7daa6 |
memory/2332-23-0x0000000001FA0000-0x00000000021FA000-memory.dmp
memory/2332-22-0x0000000000400000-0x0000000000D9E000-memory.dmp
memory/2052-15-0x0000000000400000-0x0000000000605000-memory.dmp
memory/2332-40-0x0000000000400000-0x0000000000D9E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-07 10:36
Reported
2024-11-07 10:38
Platform
win10v2004-20241007-en
Max time kernel
95s
Max time network
112s
Command Line
Signatures
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe
"C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe"
C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe
C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | cutit.org | udp |
| US | 172.232.25.148:443 | cutit.org | tcp |
| US | 8.8.8.8:53 | r11.o.lencr.org | udp |
| GB | 2.23.210.75:80 | r11.o.lencr.org | tcp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 148.25.232.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 32.169.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ww99.cutit.org | udp |
| US | 69.16.230.228:80 | ww99.cutit.org | tcp |
| US | 8.8.8.8:53 | q.gs | udp |
| US | 104.21.84.133:80 | q.gs | tcp |
| US | 8.8.8.8:53 | publisher.linkvertise.com | udp |
| US | 104.22.22.72:443 | publisher.linkvertise.com | tcp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| GB | 142.250.187.227:80 | c.pki.goog | tcp |
| US | 8.8.8.8:53 | linkvertise.com | udp |
| US | 104.22.23.72:443 | linkvertise.com | tcp |
| US | 8.8.8.8:53 | 75.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.230.16.69.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.84.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 72.22.22.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 72.23.22.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
Files
memory/3840-0-0x0000000000400000-0x0000000000D9E000-memory.dmp
memory/3840-1-0x00000000021C0000-0x000000000241A000-memory.dmp
memory/3840-3-0x0000000000400000-0x0000000000605000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\b68929b63a4c3f8a3ddebfccee4a8a3053ea93fdd7b205717a00605e7fbee65aN.exe
| MD5 | b4aaa5fced58988e82449a880b797aab |
| SHA1 | 4033ea0847b21f0c72468b80d56208b44eade4a1 |
| SHA256 | f6f1a4c2e8b5bb776b1db992703dfe4fb3beb415664fcbb5bc2038b9fe27484e |
| SHA512 | bd44e4f7e10da8f2079274261e47e53efa31b9245f7b3f5d5f9f7e17e0cbdb729e88145ef35dd027464f480e239619a610a74e382a9e4d92398044a044bd8819 |
memory/3840-13-0x0000000000400000-0x0000000000605000-memory.dmp
memory/4756-21-0x00000000023C0000-0x000000000261A000-memory.dmp
memory/4756-20-0x0000000000400000-0x0000000000D9E000-memory.dmp
memory/4756-37-0x0000000000400000-0x0000000000D9E000-memory.dmp