Analysis
-
max time kernel
116s -
max time network
113s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
29-11-2020 15:49
Static task
static1
Behavioral task
behavioral1
Sample
c1d31fa7484170247564e89c97cc325d1f317fb8c8efe50e4d126c7881adf499.exe
Resource
win7v20201028
General
-
Target
c1d31fa7484170247564e89c97cc325d1f317fb8c8efe50e4d126c7881adf499.exe
-
Size
259KB
-
MD5
1f4928730be377f7affb80c3f5305883
-
SHA1
50b760064a237f123f0f06a846b78cf58713cad1
-
SHA256
c1d31fa7484170247564e89c97cc325d1f317fb8c8efe50e4d126c7881adf499
-
SHA512
58ecec71935ab0c490d1011da04aba3d694443b67c576421e6a9e4dc615a5f43b6ee84e2d9a3a48c2895fe28b94955604c2080de290b13ecc086127e5f4dfa54
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
chtugc.exepid process 1504 chtugc.exe -
Drops file in Windows directory 2 IoCs
Processes:
c1d31fa7484170247564e89c97cc325d1f317fb8c8efe50e4d126c7881adf499.exedescription ioc process File created C:\Windows\Tasks\chtugc.job c1d31fa7484170247564e89c97cc325d1f317fb8c8efe50e4d126c7881adf499.exe File opened for modification C:\Windows\Tasks\chtugc.job c1d31fa7484170247564e89c97cc325d1f317fb8c8efe50e4d126c7881adf499.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1224 wrote to memory of 1504 1224 taskeng.exe chtugc.exe PID 1224 wrote to memory of 1504 1224 taskeng.exe chtugc.exe PID 1224 wrote to memory of 1504 1224 taskeng.exe chtugc.exe PID 1224 wrote to memory of 1504 1224 taskeng.exe chtugc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1d31fa7484170247564e89c97cc325d1f317fb8c8efe50e4d126c7881adf499.exe"C:\Users\Admin\AppData\Local\Temp\c1d31fa7484170247564e89c97cc325d1f317fb8c8efe50e4d126c7881adf499.exe"1⤵
- Drops file in Windows directory
PID:748
-
C:\Windows\system32\taskeng.exetaskeng.exe {F8305F25-EF87-4C8F-BB11-47EA250FEF4D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\ProgramData\rghi\chtugc.exeC:\ProgramData\rghi\chtugc.exe start2⤵
- Executes dropped EXE
PID:1504
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1f4928730be377f7affb80c3f5305883
SHA150b760064a237f123f0f06a846b78cf58713cad1
SHA256c1d31fa7484170247564e89c97cc325d1f317fb8c8efe50e4d126c7881adf499
SHA51258ecec71935ab0c490d1011da04aba3d694443b67c576421e6a9e4dc615a5f43b6ee84e2d9a3a48c2895fe28b94955604c2080de290b13ecc086127e5f4dfa54
-
MD5
1f4928730be377f7affb80c3f5305883
SHA150b760064a237f123f0f06a846b78cf58713cad1
SHA256c1d31fa7484170247564e89c97cc325d1f317fb8c8efe50e4d126c7881adf499
SHA51258ecec71935ab0c490d1011da04aba3d694443b67c576421e6a9e4dc615a5f43b6ee84e2d9a3a48c2895fe28b94955604c2080de290b13ecc086127e5f4dfa54