Analysis
-
max time kernel
122s -
max time network
119s -
platform
windows7_x64 -
resource
win7 -
submitted
31-07-2020 09:59
Static task
static1
Behavioral task
behavioral1
Sample
55a4729b40ed4f2aaccb3d59ddf80d95.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
55a4729b40ed4f2aaccb3d59ddf80d95.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
55a4729b40ed4f2aaccb3d59ddf80d95.exe
-
Size
151KB
-
MD5
55a4729b40ed4f2aaccb3d59ddf80d95
-
SHA1
c5cc028d488b4a348091528f3089d04dac432eaf
-
SHA256
7a245e07279488497a16ef86a6129b1bd8c72c18b37a2504bee743c528aab8da
-
SHA512
5e1afba9ccac1be8941e8e1204a1ccf5bf75f8d95b8574c13a11f0a628af7ec795be9bd2f1930b071f17016cc5af35e90e7f491c1c8e2505c4a3cb76670109cd
Score
8/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
taskeng.exedescription pid process target process PID 544 wrote to memory of 1012 544 taskeng.exe cukol.exe PID 544 wrote to memory of 1012 544 taskeng.exe cukol.exe PID 544 wrote to memory of 1012 544 taskeng.exe cukol.exe PID 544 wrote to memory of 1012 544 taskeng.exe cukol.exe PID 544 wrote to memory of 1752 544 taskeng.exe anrvgk.exe PID 544 wrote to memory of 1752 544 taskeng.exe anrvgk.exe PID 544 wrote to memory of 1752 544 taskeng.exe anrvgk.exe PID 544 wrote to memory of 1752 544 taskeng.exe anrvgk.exe PID 544 wrote to memory of 1652 544 taskeng.exe ptaakf.exe PID 544 wrote to memory of 1652 544 taskeng.exe ptaakf.exe PID 544 wrote to memory of 1652 544 taskeng.exe ptaakf.exe PID 544 wrote to memory of 1652 544 taskeng.exe ptaakf.exe -
Executes dropped EXE 3 IoCs
Processes:
cukol.exeanrvgk.exeptaakf.exepid process 1012 cukol.exe 1752 anrvgk.exe 1652 ptaakf.exe -
Drops file in Windows directory 5 IoCs
Processes:
55a4729b40ed4f2aaccb3d59ddf80d95.execukol.exeanrvgk.exedescription ioc process File created C:\Windows\Tasks\cukol.job 55a4729b40ed4f2aaccb3d59ddf80d95.exe File opened for modification C:\Windows\Tasks\cukol.job 55a4729b40ed4f2aaccb3d59ddf80d95.exe File created C:\Windows\Tasks\amekkbbqqhhxwonfeut.job cukol.exe File created C:\Windows\Tasks\ptaakf.job anrvgk.exe File opened for modification C:\Windows\Tasks\ptaakf.job anrvgk.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
55a4729b40ed4f2aaccb3d59ddf80d95.exeanrvgk.exepid process 1440 55a4729b40ed4f2aaccb3d59ddf80d95.exe 1752 anrvgk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55a4729b40ed4f2aaccb3d59ddf80d95.exe"C:\Users\Admin\AppData\Local\Temp\55a4729b40ed4f2aaccb3d59ddf80d95.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\taskeng.exetaskeng.exe {C8F84AA7-04CE-4736-ADA9-B6971C7467E0} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\kdovd\cukol.exeC:\ProgramData\kdovd\cukol.exe start2⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\TEMP\anrvgk.exeC:\Windows\TEMP\anrvgk.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\dqitt\ptaakf.exeC:\ProgramData\dqitt\ptaakf.exe start2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\dqitt\ptaakf.exe
-
C:\ProgramData\dqitt\ptaakf.exe
-
C:\ProgramData\kdovd\cukol.exe
-
C:\ProgramData\kdovd\cukol.exe
-
C:\Windows\TEMP\anrvgk.exe
-
C:\Windows\Tasks\cukol.job
-
C:\Windows\Temp\anrvgk.exe
-
memory/1012-6-0x0000000003940000-0x0000000003951000-memory.dmpFilesize
68KB
-
memory/1012-5-0x0000000003436000-0x0000000003437000-memory.dmpFilesize
4KB
-
memory/1012-3-0x0000000000000000-mapping.dmp
-
memory/1440-0-0x00000000033C6000-0x00000000033C7000-memory.dmpFilesize
4KB
-
memory/1440-1-0x0000000004CA0000-0x0000000004CB1000-memory.dmpFilesize
68KB
-
memory/1652-14-0x0000000000000000-mapping.dmp
-
memory/1652-16-0x0000000003456000-0x0000000003457000-memory.dmpFilesize
4KB
-
memory/1652-17-0x0000000003850000-0x0000000003861000-memory.dmpFilesize
68KB
-
memory/1752-8-0x0000000000000000-mapping.dmp
-
memory/1752-10-0x0000000003786000-0x0000000003787000-memory.dmpFilesize
4KB
-
memory/1752-11-0x0000000003860000-0x0000000003871000-memory.dmpFilesize
68KB