Resubmissions

24/01/2025, 18:24 UTC

250124-w12m4ssran 10

24/01/2025, 18:22 UTC

250124-wz3h1ssqfk 3

Analysis

  • max time kernel
    37s
  • max time network
    33s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2025, 18:22 UTC

General

  • Target

    f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe

  • Size

    975KB

  • MD5

    9cde35700dfe9eb8d7cd5a245c885fea

  • SHA1

    dd7f90313fdc11981b85b701c4c2935cb8d0b392

  • SHA256

    f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad

  • SHA512

    86f425c785905108676427bed397d8ddafb51bbb1fe1e36fce022e6aaea050227c0ed992eea559ac68954ae7014709d22fa406d9a38c86b62e43ca985a69c77c

  • SSDEEP

    6144:jfkvdAoVGhIIcnSXX04aVhg0SEAAVl/YpKYM463rgqq/tipAxCT:ovd1ghIfnSXE4aWEllgpPJ6b+1s

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe
    "C:\Users\Admin\AppData\Local\Temp\f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
      2⤵
        PID:1604
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:5044
      • C:\Users\Admin\AppData\Local\Temp\f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe
        "C:\Users\Admin\AppData\Local\Temp\f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe"
        1⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4480

      Network

      • flag-us
        DNS
        8.8.8.8.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        8.8.8.8.in-addr.arpa
        IN PTR
        Response
        8.8.8.8.in-addr.arpa
        IN PTR
        dnsgoogle
      • flag-us
        DNS
        104.219.191.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        104.219.191.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        i.ibb.co
        f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe
        Remote address:
        8.8.8.8:53
        Request
        i.ibb.co
        IN A
        Response
        i.ibb.co
        IN A
        91.134.10.127
        i.ibb.co
        IN A
        91.134.10.168
        i.ibb.co
        IN A
        91.134.10.182
        i.ibb.co
        IN A
        91.134.82.79
        i.ibb.co
        IN A
        91.134.9.159
        i.ibb.co
        IN A
        91.134.9.160
      • flag-fr
        GET
        https://i.ibb.co/xLJXQ55/mamasafa-Final.webp
        f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe
        Remote address:
        91.134.10.127:443
        Request
        GET /xLJXQ55/mamasafa-Final.webp HTTP/1.1
        Host: i.ibb.co
        Connection: Keep-Alive
        Response
        HTTP/1.1 200 OK
        Server: openresty
        Date: Fri, 24 Jan 2025 18:22:42 GMT
        Content-Type: image/webp
        Content-Length: 3722252
        Connection: keep-alive
        Last-Modified: Sun, 29 Dec 2024 02:41:53 GMT
        Expires: Thu, 31 Dec 2037 23:55:55 GMT
        Cache-Control: max-age=315360000
        Cache-Control: public
        Access-Control-Allow-Origin: *
        Access-Control-Allow-Methods: GET, OPTIONS
        Accept-Ranges: bytes
      • flag-us
        DNS
        172.210.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.210.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        127.10.134.91.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        127.10.134.91.in-addr.arpa
        IN PTR
        Response
        127.10.134.91.in-addr.arpa
        IN PTR
        ns3243671 ip-91-134-10eu
      • flag-us
        DNS
        68.159.190.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        68.159.190.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        5.114.82.104.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        5.114.82.104.in-addr.arpa
        IN PTR
        Response
        5.114.82.104.in-addr.arpa
        IN PTR
        a104-82-114-5deploystaticakamaitechnologiescom
      • flag-us
        DNS
        209.205.72.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        209.205.72.20.in-addr.arpa
        IN PTR
        Response
      • flag-fr
        GET
        https://i.ibb.co/xLJXQ55/mamasafa-Final.webp
        f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe
        Remote address:
        91.134.10.127:443
        Request
        GET /xLJXQ55/mamasafa-Final.webp HTTP/1.1
        Host: i.ibb.co
        Connection: Keep-Alive
        Response
        HTTP/1.1 200 OK
        Server: openresty
        Date: Fri, 24 Jan 2025 18:23:10 GMT
        Content-Type: image/webp
        Content-Length: 3722252
        Connection: keep-alive
        Last-Modified: Sun, 29 Dec 2024 02:41:53 GMT
        Expires: Thu, 31 Dec 2037 23:55:55 GMT
        Cache-Control: max-age=315360000
        Cache-Control: public
        Access-Control-Allow-Origin: *
        Access-Control-Allow-Methods: GET, OPTIONS
        Accept-Ranges: bytes
      • flag-us
        DNS
        56.163.245.4.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        56.163.245.4.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        18.31.95.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        18.31.95.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        172.214.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.214.232.199.in-addr.arpa
        IN PTR
        Response
      • 91.134.10.127:443
        https://i.ibb.co/xLJXQ55/mamasafa-Final.webp
        tls, http
        f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe
        207.7kB
        3.9MB
        2762
        2769

        HTTP Request

        GET https://i.ibb.co/xLJXQ55/mamasafa-Final.webp

        HTTP Response

        200
      • 91.134.10.127:443
        https://i.ibb.co/xLJXQ55/mamasafa-Final.webp
        tls, http
        f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe
        161.1kB
        3.9MB
        2443
        2769

        HTTP Request

        GET https://i.ibb.co/xLJXQ55/mamasafa-Final.webp

        HTTP Response

        200
      • 8.8.8.8:53
        8.8.8.8.in-addr.arpa
        dns
        66 B
        90 B
        1
        1

        DNS Request

        8.8.8.8.in-addr.arpa

      • 8.8.8.8:53
        104.219.191.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        104.219.191.52.in-addr.arpa

      • 8.8.8.8:53
        i.ibb.co
        dns
        f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe
        54 B
        150 B
        1
        1

        DNS Request

        i.ibb.co

        DNS Response

        91.134.10.127
        91.134.10.168
        91.134.10.182
        91.134.82.79
        91.134.9.159
        91.134.9.160

      • 8.8.8.8:53
        172.210.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.210.232.199.in-addr.arpa

      • 8.8.8.8:53
        127.10.134.91.in-addr.arpa
        dns
        72 B
        111 B
        1
        1

        DNS Request

        127.10.134.91.in-addr.arpa

      • 8.8.8.8:53
        5.114.82.104.in-addr.arpa
        dns
        71 B
        135 B
        1
        1

        DNS Request

        5.114.82.104.in-addr.arpa

      • 8.8.8.8:53
        68.159.190.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        68.159.190.20.in-addr.arpa

      • 8.8.8.8:53
        209.205.72.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        209.205.72.20.in-addr.arpa

      • 8.8.8.8:53
        56.163.245.4.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        56.163.245.4.in-addr.arpa

      • 8.8.8.8:53
        18.31.95.13.in-addr.arpa
        dns
        70 B
        144 B
        1
        1

        DNS Request

        18.31.95.13.in-addr.arpa

      • 8.8.8.8:53
        172.214.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.214.232.199.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2268-0-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

        Filesize

        4KB

      • memory/2268-1-0x0000000000C40000-0x0000000000D38000-memory.dmp

        Filesize

        992KB

      • memory/2268-2-0x0000000005D60000-0x0000000006304000-memory.dmp

        Filesize

        5.6MB

      • memory/2268-3-0x00000000057B0000-0x0000000005842000-memory.dmp

        Filesize

        584KB

      • memory/2268-4-0x0000000005850000-0x0000000005BA4000-memory.dmp

        Filesize

        3.3MB

      • memory/2268-5-0x0000000005C50000-0x0000000005CEC000-memory.dmp

        Filesize

        624KB

      • memory/2268-6-0x0000000005700000-0x0000000005722000-memory.dmp

        Filesize

        136KB

      • memory/2268-7-0x0000000005BC0000-0x0000000005BCA000-memory.dmp

        Filesize

        40KB

      • memory/2268-8-0x0000000074C50000-0x0000000075400000-memory.dmp

        Filesize

        7.7MB

      • memory/2268-9-0x0000000008A40000-0x0000000008D02000-memory.dmp

        Filesize

        2.8MB

      • memory/2268-10-0x0000000001740000-0x0000000001746000-memory.dmp

        Filesize

        24KB

      • memory/2268-11-0x0000000074C50000-0x0000000075400000-memory.dmp

        Filesize

        7.7MB

      • memory/2268-12-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

        Filesize

        4KB

      • memory/2268-13-0x0000000008890000-0x00000000088AA000-memory.dmp

        Filesize

        104KB

      • memory/2268-14-0x00000000087B0000-0x00000000087B6000-memory.dmp

        Filesize

        24KB

      • memory/2268-15-0x0000000074C50000-0x0000000075400000-memory.dmp

        Filesize

        7.7MB

      • memory/2268-16-0x0000000074C50000-0x0000000075400000-memory.dmp

        Filesize

        7.7MB

      • memory/4480-17-0x0000000074C50000-0x0000000075400000-memory.dmp

        Filesize

        7.7MB

      • memory/4480-18-0x0000000074C50000-0x0000000075400000-memory.dmp

        Filesize

        7.7MB

      • memory/4480-19-0x0000000074C50000-0x0000000075400000-memory.dmp

        Filesize

        7.7MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.