Analysis
-
max time kernel
146s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-07-2024 01:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a.exe
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a.exe
-
Size
271KB
-
MD5
9d697a19004e86acede9ee1bef4ff664
-
SHA1
6193e527615492a1525f10172fefd69460170484
-
SHA256
ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a
-
SHA512
25f26e09f50425c762e370bd7873d782aea7cd0328b30b0ed29e09692b5b380fdee1934d43c68848cace432dd9615791225f2531b3bb274c49d4cb692e50689d
-
SSDEEP
3072:tDcnJEoBClZIwxVHOK7Vef43d73l1dRHHg2IgJnNDcBkbzsJmrh/SC1uq0RN8kfn:tDcXWZPXQf4th1LguJzbz048
Score
6/10
Malware Config
Signatures
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 api.ipify.org 3 api.ipify.org 4 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a.exedescription pid process Token: SeDebugPrivilege 2468 ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a.exepid process 2468 ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a.exe"C:\Users\Admin\AppData\Local\Temp\ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2468-0-0x000007FEF488E000-0x000007FEF488F000-memory.dmpFilesize
4KB
-
memory/2468-1-0x000007FEF45D0000-0x000007FEF4F6D000-memory.dmpFilesize
9.6MB
-
memory/2468-2-0x000007FEF45D0000-0x000007FEF4F6D000-memory.dmpFilesize
9.6MB
-
memory/2468-3-0x000007FEF45D0000-0x000007FEF4F6D000-memory.dmpFilesize
9.6MB
-
memory/2468-5-0x000007FEF45D0000-0x000007FEF4F6D000-memory.dmpFilesize
9.6MB
-
memory/2468-6-0x000007FEF45D0000-0x000007FEF4F6D000-memory.dmpFilesize
9.6MB