Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
12-10-2020 14:15
Static task
static1
Behavioral task
behavioral1
Sample
cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe
Resource
win10v200722
General
-
Target
cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe
-
Size
206KB
-
MD5
e883226589b32952d07e057c468ffbb8
-
SHA1
3e424264572d0d986fa3ae49c98f566ba7d8e2d7
-
SHA256
cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71
-
SHA512
9520111d2cab4c760ee6a91148265dc3fbd65f37688ed8a9aeed543fe99a565c4fe47f22abbf067d2d81ddd4cc69106a9fdba823d3a1af80882bce61dd312487
Malware Config
Signatures
-
Blacklisted process makes network request 2 IoCs
flow pid Process 15 960 rundll32.exe 16 2780 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 3052 skdbn.exe 188 skdbn.exe 1496 skdbn.exe 3376 skdbn.exe -
Loads dropped DLL 2 IoCs
pid Process 960 rundll32.exe 2780 rundll32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4032 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 960 rundll32.exe 960 rundll32.exe 960 rundll32.exe 960 rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3876 wrote to memory of 3052 3876 cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe 74 PID 3876 wrote to memory of 3052 3876 cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe 74 PID 3876 wrote to memory of 3052 3876 cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe 74 PID 3052 wrote to memory of 4032 3052 skdbn.exe 76 PID 3052 wrote to memory of 4032 3052 skdbn.exe 76 PID 3052 wrote to memory of 4032 3052 skdbn.exe 76 PID 3052 wrote to memory of 960 3052 skdbn.exe 78 PID 3052 wrote to memory of 960 3052 skdbn.exe 78 PID 3052 wrote to memory of 960 3052 skdbn.exe 78 PID 3052 wrote to memory of 2780 3052 skdbn.exe 80 PID 3052 wrote to memory of 2780 3052 skdbn.exe 80 PID 3052 wrote to memory of 2780 3052 skdbn.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe"C:\Users\Admin\AppData\Local\Temp\cea813cbef6581e0c95aacb2e747f5951325444b941e801164154917a17bfe71.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\ProgramData\a76878f016\skdbn.exe"C:\ProgramData\a76878f016\skdbn.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN skdbn.exe /TR "C:\ProgramData\a76878f016\skdbn.exe" /F3⤵
- Creates scheduled task(s)
PID:4032
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\ProgramData\a76878f016\cred.dll, Main3⤵
- Blacklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:960
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\ProgramData\a76878f016\scr.dll, Main3⤵
- Blacklisted process makes network request
- Loads dropped DLL
PID:2780
-
-
-
C:\ProgramData\a76878f016\skdbn.exeC:\ProgramData\a76878f016\skdbn.exe1⤵
- Executes dropped EXE
PID:188
-
C:\ProgramData\a76878f016\skdbn.exeC:\ProgramData\a76878f016\skdbn.exe1⤵
- Executes dropped EXE
PID:1496
-
C:\ProgramData\a76878f016\skdbn.exeC:\ProgramData\a76878f016\skdbn.exe1⤵
- Executes dropped EXE
PID:3376