Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2024 01:43
Static task
static1
Behavioral task
behavioral1
Sample
ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a.exe
Resource
win7-20240704-en
General
-
Target
ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a.exe
-
Size
271KB
-
MD5
9d697a19004e86acede9ee1bef4ff664
-
SHA1
6193e527615492a1525f10172fefd69460170484
-
SHA256
ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a
-
SHA512
25f26e09f50425c762e370bd7873d782aea7cd0328b30b0ed29e09692b5b380fdee1934d43c68848cace432dd9615791225f2531b3bb274c49d4cb692e50689d
-
SSDEEP
3072:tDcnJEoBClZIwxVHOK7Vef43d73l1dRHHg2IgJnNDcBkbzsJmrh/SC1uq0RN8kfn:tDcXWZPXQf4th1LguJzbz048
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 10 api.ipify.org 11 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a.exedescription pid process Token: SeDebugPrivilege 692 ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a.exepid process 692 ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/692-0-0x00007FFBD2975000-0x00007FFBD2976000-memory.dmpFilesize
4KB
-
memory/692-1-0x00007FFBD26C0000-0x00007FFBD3061000-memory.dmpFilesize
9.6MB
-
memory/692-3-0x000000001C1D0000-0x000000001C26C000-memory.dmpFilesize
624KB
-
memory/692-4-0x00007FFBD26C0000-0x00007FFBD3061000-memory.dmpFilesize
9.6MB
-
memory/692-2-0x000000001BC60000-0x000000001C12E000-memory.dmpFilesize
4.8MB
-
memory/692-5-0x000000001C350000-0x000000001C3B2000-memory.dmpFilesize
392KB
-
memory/692-6-0x00007FFBD26C0000-0x00007FFBD3061000-memory.dmpFilesize
9.6MB
-
memory/692-8-0x00007FFBD26C0000-0x00007FFBD3061000-memory.dmpFilesize
9.6MB
-
memory/692-9-0x000000001C2D0000-0x000000001C2D8000-memory.dmpFilesize
32KB
-
memory/692-10-0x00007FFBD2975000-0x00007FFBD2976000-memory.dmpFilesize
4KB
-
memory/692-11-0x00007FFBD26C0000-0x00007FFBD3061000-memory.dmpFilesize
9.6MB
-
memory/692-12-0x00007FFBD26C0000-0x00007FFBD3061000-memory.dmpFilesize
9.6MB