Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 00:01 UTC
Behavioral task
behavioral1
Sample
ip_grabber_tool.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ip_grabber_tool.exe
Resource
win10v2004-20250314-en
General
-
Target
ip_grabber_tool.exe
-
Size
17.6MB
-
MD5
7e98ebec945f9642f13cdf6f980d1d48
-
SHA1
f4b3e9e29c92a976f04681f8c66fbed903b85e38
-
SHA256
1c08f0e46ac63d1443dfbbb1221dbf8c6b367688b0ccd8b07b3d6e024173e843
-
SHA512
5c8d9f05a74c102d8cf4e57503a9d3b1641b370297901204e7c486f80b9dd0d677b186049f17afc8917b2dee6095cd6c0c32a7ea0d58b2b96da31914c71bc77b
-
SSDEEP
393216:7qPnLFXlr7gQpDOETgsvfG7grCENjkvEYxmD/L0:OPLFXNEQoEsO/jd5DD
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2288 ip_grabber_tool.exe -
resource yara_rule behavioral1/files/0x000500000001a4e1-111.dat upx behavioral1/memory/2288-113-0x000007FEF63E0000-0x000007FEF684E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2288 2312 ip_grabber_tool.exe 30 PID 2312 wrote to memory of 2288 2312 ip_grabber_tool.exe 30 PID 2312 wrote to memory of 2288 2312 ip_grabber_tool.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD569d4f13fbaeee9b551c2d9a4a94d4458
SHA169540d8dfc0ee299a7ff6585018c7db0662aa629
SHA256801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046
SHA5128e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378