Analysis
-
max time kernel
72s -
max time network
145s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-03-2021 15:27
Static task
static1
Behavioral task
behavioral1
Sample
195fa07b1f6fc1c8d4fab943f3b795beeb8cf44495e6e1cedfe0acbeb8a033a1.bin.exe
Resource
win7v20201028
General
-
Target
195fa07b1f6fc1c8d4fab943f3b795beeb8cf44495e6e1cedfe0acbeb8a033a1.bin.exe
-
Size
30KB
-
MD5
9e59c1246f4cb952549c2d12f32208cd
-
SHA1
6412f4e284a1d5fb720f4e1a9d1e08b5bf7a9e5d
-
SHA256
195fa07b1f6fc1c8d4fab943f3b795beeb8cf44495e6e1cedfe0acbeb8a033a1
-
SHA512
2bbdc436a10792aeda2773466c08f919864c23e1503a8964b10990bd16a45054e0ed179d07872959a1eb6552a14a8f730ac6c44f9278057e732ee08c6e3ec494
Malware Config
Extracted
systembc
104.217.8.100:5050
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
hwiis.exepid process 1344 hwiis.exe -
Drops file in Windows directory 2 IoCs
Processes:
195fa07b1f6fc1c8d4fab943f3b795beeb8cf44495e6e1cedfe0acbeb8a033a1.bin.exedescription ioc process File created C:\Windows\Tasks\hwiis.job 195fa07b1f6fc1c8d4fab943f3b795beeb8cf44495e6e1cedfe0acbeb8a033a1.bin.exe File opened for modification C:\Windows\Tasks\hwiis.job 195fa07b1f6fc1c8d4fab943f3b795beeb8cf44495e6e1cedfe0acbeb8a033a1.bin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
195fa07b1f6fc1c8d4fab943f3b795beeb8cf44495e6e1cedfe0acbeb8a033a1.bin.exepid process 1064 195fa07b1f6fc1c8d4fab943f3b795beeb8cf44495e6e1cedfe0acbeb8a033a1.bin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1660 wrote to memory of 1344 1660 taskeng.exe hwiis.exe PID 1660 wrote to memory of 1344 1660 taskeng.exe hwiis.exe PID 1660 wrote to memory of 1344 1660 taskeng.exe hwiis.exe PID 1660 wrote to memory of 1344 1660 taskeng.exe hwiis.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\195fa07b1f6fc1c8d4fab943f3b795beeb8cf44495e6e1cedfe0acbeb8a033a1.bin.exe"C:\Users\Admin\AppData\Local\Temp\195fa07b1f6fc1c8d4fab943f3b795beeb8cf44495e6e1cedfe0acbeb8a033a1.bin.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\taskeng.exetaskeng.exe {BF4336EE-B5B0-4B77-A5CF-0E33DD4A9EF4} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\kgiapg\hwiis.exeC:\ProgramData\kgiapg\hwiis.exe start2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\kgiapg\hwiis.exeMD5
9e59c1246f4cb952549c2d12f32208cd
SHA16412f4e284a1d5fb720f4e1a9d1e08b5bf7a9e5d
SHA256195fa07b1f6fc1c8d4fab943f3b795beeb8cf44495e6e1cedfe0acbeb8a033a1
SHA5122bbdc436a10792aeda2773466c08f919864c23e1503a8964b10990bd16a45054e0ed179d07872959a1eb6552a14a8f730ac6c44f9278057e732ee08c6e3ec494
-
C:\ProgramData\kgiapg\hwiis.exeMD5
9e59c1246f4cb952549c2d12f32208cd
SHA16412f4e284a1d5fb720f4e1a9d1e08b5bf7a9e5d
SHA256195fa07b1f6fc1c8d4fab943f3b795beeb8cf44495e6e1cedfe0acbeb8a033a1
SHA5122bbdc436a10792aeda2773466c08f919864c23e1503a8964b10990bd16a45054e0ed179d07872959a1eb6552a14a8f730ac6c44f9278057e732ee08c6e3ec494
-
memory/1064-2-0x0000000076101000-0x0000000076103000-memory.dmpFilesize
8KB
-
memory/1344-4-0x0000000000000000-mapping.dmp