Analysis
-
max time kernel
123s -
max time network
124s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
28-11-2020 10:30
Static task
static1
Behavioral task
behavioral1
Sample
761e217f02855c7368259f63332d61df.exe
Resource
win7v20201028
General
-
Target
761e217f02855c7368259f63332d61df.exe
-
Size
266KB
-
MD5
761e217f02855c7368259f63332d61df
-
SHA1
a8f7630f3804f9d52da46e18efa0116ff5d4262b
-
SHA256
d896fea673941330bf9b4aca5ad7bd1b5e12d3768bfaea9521c843ac1324c629
-
SHA512
d24886f732a2e3d38e56ff56ea0e2f65eb686af2ace6c76368930505b1efcf2124727b65cbf2d406805ee9e73b074af8d6434e5503f8b14745625e3026a7278c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
tbvuvu.exepid process 1272 tbvuvu.exe -
Drops file in Windows directory 2 IoCs
Processes:
761e217f02855c7368259f63332d61df.exedescription ioc process File opened for modification C:\Windows\Tasks\tbvuvu.job 761e217f02855c7368259f63332d61df.exe File created C:\Windows\Tasks\tbvuvu.job 761e217f02855c7368259f63332d61df.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
761e217f02855c7368259f63332d61df.exepid process 836 761e217f02855c7368259f63332d61df.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1232 wrote to memory of 1272 1232 taskeng.exe tbvuvu.exe PID 1232 wrote to memory of 1272 1232 taskeng.exe tbvuvu.exe PID 1232 wrote to memory of 1272 1232 taskeng.exe tbvuvu.exe PID 1232 wrote to memory of 1272 1232 taskeng.exe tbvuvu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\761e217f02855c7368259f63332d61df.exe"C:\Users\Admin\AppData\Local\Temp\761e217f02855c7368259f63332d61df.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:836
-
C:\Windows\system32\taskeng.exetaskeng.exe {C9E5968C-DAED-4004-974A-F0B38C8BC136} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\ProgramData\xpbwr\tbvuvu.exeC:\ProgramData\xpbwr\tbvuvu.exe start2⤵
- Executes dropped EXE
PID:1272
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
761e217f02855c7368259f63332d61df
SHA1a8f7630f3804f9d52da46e18efa0116ff5d4262b
SHA256d896fea673941330bf9b4aca5ad7bd1b5e12d3768bfaea9521c843ac1324c629
SHA512d24886f732a2e3d38e56ff56ea0e2f65eb686af2ace6c76368930505b1efcf2124727b65cbf2d406805ee9e73b074af8d6434e5503f8b14745625e3026a7278c
-
MD5
761e217f02855c7368259f63332d61df
SHA1a8f7630f3804f9d52da46e18efa0116ff5d4262b
SHA256d896fea673941330bf9b4aca5ad7bd1b5e12d3768bfaea9521c843ac1324c629
SHA512d24886f732a2e3d38e56ff56ea0e2f65eb686af2ace6c76368930505b1efcf2124727b65cbf2d406805ee9e73b074af8d6434e5503f8b14745625e3026a7278c