Analysis
-
max time kernel
100s -
max time network
14s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-12-2020 08:14
Static task
static1
Behavioral task
behavioral1
Sample
c96012bf82cc15058dd53887b068bbd8.exe
Resource
win7v20201028
General
-
Target
c96012bf82cc15058dd53887b068bbd8.exe
-
Size
267KB
-
MD5
c96012bf82cc15058dd53887b068bbd8
-
SHA1
3502862e8ef4edd8ff5a427849d8c9f38e45160d
-
SHA256
36a101b5a13436dd67e2b33c2abbae7cdd86a7ed951185a1914c12685339ad74
-
SHA512
315495dcba5d3624ce716ea534a1f74d7256f176b06a7dac006b64d8019ce4dc9ae67857466d1a838ab8bd02ad70fb14b4e425ab29e5e00c6ab8b19a0d94e56a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ldpke.exepid process 1368 ldpke.exe -
Drops file in Windows directory 2 IoCs
Processes:
c96012bf82cc15058dd53887b068bbd8.exedescription ioc process File created C:\Windows\Tasks\ldpke.job c96012bf82cc15058dd53887b068bbd8.exe File opened for modification C:\Windows\Tasks\ldpke.job c96012bf82cc15058dd53887b068bbd8.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c96012bf82cc15058dd53887b068bbd8.exepid process 1208 c96012bf82cc15058dd53887b068bbd8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1700 wrote to memory of 1368 1700 taskeng.exe ldpke.exe PID 1700 wrote to memory of 1368 1700 taskeng.exe ldpke.exe PID 1700 wrote to memory of 1368 1700 taskeng.exe ldpke.exe PID 1700 wrote to memory of 1368 1700 taskeng.exe ldpke.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c96012bf82cc15058dd53887b068bbd8.exe"C:\Users\Admin\AppData\Local\Temp\c96012bf82cc15058dd53887b068bbd8.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
C:\Windows\system32\taskeng.exetaskeng.exe {B2A4C25F-7622-4523-A807-5386A0BC1BD3} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\ProgramData\ubxwedc\ldpke.exeC:\ProgramData\ubxwedc\ldpke.exe start2⤵
- Executes dropped EXE
PID:1368
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c96012bf82cc15058dd53887b068bbd8
SHA13502862e8ef4edd8ff5a427849d8c9f38e45160d
SHA25636a101b5a13436dd67e2b33c2abbae7cdd86a7ed951185a1914c12685339ad74
SHA512315495dcba5d3624ce716ea534a1f74d7256f176b06a7dac006b64d8019ce4dc9ae67857466d1a838ab8bd02ad70fb14b4e425ab29e5e00c6ab8b19a0d94e56a
-
MD5
c96012bf82cc15058dd53887b068bbd8
SHA13502862e8ef4edd8ff5a427849d8c9f38e45160d
SHA25636a101b5a13436dd67e2b33c2abbae7cdd86a7ed951185a1914c12685339ad74
SHA512315495dcba5d3624ce716ea534a1f74d7256f176b06a7dac006b64d8019ce4dc9ae67857466d1a838ab8bd02ad70fb14b4e425ab29e5e00c6ab8b19a0d94e56a