Analysis

  • max time kernel
    150s
  • max time network
    86s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    31-07-2020 12:05

General

  • Target

    e72863de70ee56a86c394313e9ac4558.exe

  • Size

    150KB

  • MD5

    e72863de70ee56a86c394313e9ac4558

  • SHA1

    c9c57dd5bcfd469b4872a2851b93e7c6716b33bd

  • SHA256

    c5bc1c6af0d7ef6f65692aec19d9ef0f393a1ca80ce9a45671ce451e41dee85a

  • SHA512

    c70e1270c6380a378cee5f4aa6bf83c0cd9a9d439b9da7259fe3e338fd0486ecc95bd3071b3bb9dd920c4c19cf0ad7315850d5156cd0132870991d3bd16616fd

Score
8/10

Malware Config

Signatures

  • Drops file in Windows directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Executes dropped EXE 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e72863de70ee56a86c394313e9ac4558.exe
    "C:\Users\Admin\AppData\Local\Temp\e72863de70ee56a86c394313e9ac4558.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1480
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {68CE3B5A-98A6-4ABA-A901-D67E04A82DC3} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\ProgramData\bbwroi\ggjlmc.exe
      C:\ProgramData\bbwroi\ggjlmc.exe start
      2⤵
      • Drops file in Windows directory
      • Executes dropped EXE
      PID:1008
    • C:\Windows\TEMP\ejqcolw.exe
      C:\Windows\TEMP\ejqcolw.exe
      2⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Executes dropped EXE
      PID:752
    • C:\ProgramData\puwgw\jqxm.exe
      C:\ProgramData\puwgw\jqxm.exe start
      2⤵
      • Executes dropped EXE
      PID:896

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\bbwroi\ggjlmc.exe
  • C:\ProgramData\bbwroi\ggjlmc.exe
  • C:\ProgramData\puwgw\jqxm.exe
  • C:\ProgramData\puwgw\jqxm.exe
  • C:\Windows\TEMP\ejqcolw.exe
  • C:\Windows\Tasks\ggjlmc.job
  • C:\Windows\Temp\ejqcolw.exe
  • memory/752-8-0x0000000000000000-mapping.dmp
  • memory/752-10-0x00000000034C6000-0x00000000034C7000-memory.dmp
    Filesize

    4KB

  • memory/752-11-0x0000000003A10000-0x0000000003A21000-memory.dmp
    Filesize

    68KB

  • memory/896-14-0x0000000000000000-mapping.dmp
  • memory/896-16-0x00000000037A6000-0x00000000037A7000-memory.dmp
    Filesize

    4KB

  • memory/896-17-0x0000000003880000-0x0000000003891000-memory.dmp
    Filesize

    68KB

  • memory/1008-6-0x0000000003870000-0x0000000003881000-memory.dmp
    Filesize

    68KB

  • memory/1008-5-0x0000000003476000-0x0000000003477000-memory.dmp
    Filesize

    4KB

  • memory/1008-3-0x0000000000000000-mapping.dmp
  • memory/1480-0-0x0000000003436000-0x0000000003437000-memory.dmp
    Filesize

    4KB

  • memory/1480-1-0x0000000004D50000-0x0000000004D61000-memory.dmp
    Filesize

    68KB