Analysis
-
max time kernel
136s -
max time network
138s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
12/10/2020, 14:15
Static task
static1
Behavioral task
behavioral1
Sample
cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe
Resource
win10v200722
General
-
Target
cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe
-
Size
206KB
-
MD5
e883226589b32952d07e057c468ffbb8
-
SHA1
3e424264572d0d986fa3ae49c98f566ba7d8e2d7
-
SHA256
cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71
-
SHA512
9520111d2cab4c760ee6a91148265dc3fbd65f37688ed8a9aeed543fe99a565c4fe47f22abbf067d2d81ddd4cc69106a9fdba823d3a1af80882bce61dd312487
Malware Config
Signatures
-
Blacklisted process makes network request 2 IoCs
flow pid Process 7 324 rundll32.exe 8 612 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 1580 skdbn.exe 468 skdbn.exe 1440 skdbn.exe 1236 skdbn.exe -
Loads dropped DLL 10 IoCs
pid Process 776 cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe 776 cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 612 rundll32.exe 612 rundll32.exe 612 rundll32.exe 612 rundll32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 776 wrote to memory of 1580 776 cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe 28 PID 776 wrote to memory of 1580 776 cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe 28 PID 776 wrote to memory of 1580 776 cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe 28 PID 776 wrote to memory of 1580 776 cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe 28 PID 1580 wrote to memory of 1992 1580 skdbn.exe 29 PID 1580 wrote to memory of 1992 1580 skdbn.exe 29 PID 1580 wrote to memory of 1992 1580 skdbn.exe 29 PID 1580 wrote to memory of 1992 1580 skdbn.exe 29 PID 1600 wrote to memory of 468 1600 taskeng.exe 33 PID 1600 wrote to memory of 468 1600 taskeng.exe 33 PID 1600 wrote to memory of 468 1600 taskeng.exe 33 PID 1600 wrote to memory of 468 1600 taskeng.exe 33 PID 1580 wrote to memory of 324 1580 skdbn.exe 35 PID 1580 wrote to memory of 324 1580 skdbn.exe 35 PID 1580 wrote to memory of 324 1580 skdbn.exe 35 PID 1580 wrote to memory of 324 1580 skdbn.exe 35 PID 1580 wrote to memory of 324 1580 skdbn.exe 35 PID 1580 wrote to memory of 324 1580 skdbn.exe 35 PID 1580 wrote to memory of 324 1580 skdbn.exe 35 PID 1580 wrote to memory of 612 1580 skdbn.exe 36 PID 1580 wrote to memory of 612 1580 skdbn.exe 36 PID 1580 wrote to memory of 612 1580 skdbn.exe 36 PID 1580 wrote to memory of 612 1580 skdbn.exe 36 PID 1580 wrote to memory of 612 1580 skdbn.exe 36 PID 1580 wrote to memory of 612 1580 skdbn.exe 36 PID 1580 wrote to memory of 612 1580 skdbn.exe 36 PID 1600 wrote to memory of 1440 1600 taskeng.exe 37 PID 1600 wrote to memory of 1440 1600 taskeng.exe 37 PID 1600 wrote to memory of 1440 1600 taskeng.exe 37 PID 1600 wrote to memory of 1440 1600 taskeng.exe 37 PID 1600 wrote to memory of 1236 1600 taskeng.exe 38 PID 1600 wrote to memory of 1236 1600 taskeng.exe 38 PID 1600 wrote to memory of 1236 1600 taskeng.exe 38 PID 1600 wrote to memory of 1236 1600 taskeng.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe"C:\Users\Admin\AppData\Local\Temp\cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:776 -
C:\ProgramData\a76878f016\skdbn.exe"C:\ProgramData\a76878f016\skdbn.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN skdbn.exe /TR "C:\ProgramData\a76878f016\skdbn.exe" /F3⤵
- Creates scheduled task(s)
PID:1992
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\ProgramData\a76878f016\cred.dll, Main3⤵
- Blacklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:324
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\ProgramData\a76878f016\scr.dll, Main3⤵
- Blacklisted process makes network request
- Loads dropped DLL
PID:612
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3F675656-26D2-49F6-A13B-D672273DA121} S-1-5-21-403932158-3302036622-1224131197-1000:ELJKIHEZ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\ProgramData\a76878f016\skdbn.exeC:\ProgramData\a76878f016\skdbn.exe2⤵
- Executes dropped EXE
PID:468
-
-
C:\ProgramData\a76878f016\skdbn.exeC:\ProgramData\a76878f016\skdbn.exe2⤵
- Executes dropped EXE
PID:1440
-
-
C:\ProgramData\a76878f016\skdbn.exeC:\ProgramData\a76878f016\skdbn.exe2⤵
- Executes dropped EXE
PID:1236
-