Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
02-03-2021 21:49
Static task
static1
Behavioral task
behavioral1
Sample
dwe.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
dwe.exe
-
Size
708KB
-
MD5
9b5faf228e2047d8d912e406f9a6eca3
-
SHA1
5aa586a0cd2edf8ddacaa72853a1eb80a50b975b
-
SHA256
330690fd9d001e63f7aa537a28d326e7ffcd61d59ba140a637337ccad1cafb52
-
SHA512
5684f2a0a9aedacd590eeb76fe8812f08722af76df70fb6698ebf06f0a3db700a3049af26ea76bbc88900c4b109e4bfc19d4c7405497269a609a7c5c2354ac92
Malware Config
Extracted
Family
systembc
C2
78.141.210.78:443
45.141.87.60:443
Signatures
-
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral1/memory/1432-5-0x0000000000240000-0x0000000000246000-memory.dmp dave -
Drops file in Windows directory 2 IoCs
Processes:
dwe.exedescription ioc process File created C:\Windows\Tasks\wow64.job dwe.exe File opened for modification C:\Windows\Tasks\wow64.job dwe.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
dwe.exedwe.exepid process 1432 dwe.exe 1432 dwe.exe 1860 dwe.exe 1860 dwe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1836 wrote to memory of 1860 1836 taskeng.exe dwe.exe PID 1836 wrote to memory of 1860 1836 taskeng.exe dwe.exe PID 1836 wrote to memory of 1860 1836 taskeng.exe dwe.exe PID 1836 wrote to memory of 1860 1836 taskeng.exe dwe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dwe.exe"C:\Users\Admin\AppData\Local\Temp\dwe.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\taskeng.exetaskeng.exe {D4B49C4F-456D-456D-A0E6-38D0078F4ADD} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dwe.exeC:\Users\Admin\AppData\Local\Temp\dwe.exe start2⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1432-2-0x0000000075BF1000-0x0000000075BF3000-memory.dmpFilesize
8KB
-
memory/1432-3-0x00000000002D0000-0x00000000002D9000-memory.dmpFilesize
36KB
-
memory/1432-4-0x00000000002E0000-0x00000000002E7000-memory.dmpFilesize
28KB
-
memory/1432-5-0x0000000000240000-0x0000000000246000-memory.dmpFilesize
24KB
-
memory/1860-6-0x0000000000000000-mapping.dmp
-
memory/1860-8-0x0000000000510000-0x0000000000519000-memory.dmpFilesize
36KB
-
memory/1860-9-0x0000000000520000-0x0000000000527000-memory.dmpFilesize
28KB