Analysis
-
max time kernel
71s -
max time network
132s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
27-05-2021 13:04
Static task
static1
Behavioral task
behavioral1
Sample
ef135e02cd07e94c493061950ea99a3e.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
ef135e02cd07e94c493061950ea99a3e.exe
-
Size
524KB
-
MD5
ef135e02cd07e94c493061950ea99a3e
-
SHA1
1b0cbec8bc066ebe12ab6a66e8e8901c2024bf03
-
SHA256
2866a252b6007fe9487d85b87ed23f6dddaf2f4f8ccc82328212985bfc6dd5d5
-
SHA512
3654bffbf3dcecd629fda6e5c1fb1b5d41c814ed321633d8beba964341009c7be47bbccbac137e79f6a694b3dc05a18f529b5f7e0305899760a1d5e4a3c94ec3
Malware Config
Extracted
Family
systembc
C2
88.198.147.80:4174
78.47.64.46:4174
Signatures
-
Drops file in Windows directory 3 IoCs
Processes:
ef135e02cd07e94c493061950ea99a3e.exeef135e02cd07e94c493061950ea99a3e.exedescription ioc process File created C:\Windows\Tasks\wow64.job ef135e02cd07e94c493061950ea99a3e.exe File opened for modification C:\Windows\Tasks\wow64.job ef135e02cd07e94c493061950ea99a3e.exe File created C:\Windows\Tasks\trtscknvaijtwgjruef.job ef135e02cd07e94c493061950ea99a3e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1700 wrote to memory of 824 1700 taskeng.exe ef135e02cd07e94c493061950ea99a3e.exe PID 1700 wrote to memory of 824 1700 taskeng.exe ef135e02cd07e94c493061950ea99a3e.exe PID 1700 wrote to memory of 824 1700 taskeng.exe ef135e02cd07e94c493061950ea99a3e.exe PID 1700 wrote to memory of 824 1700 taskeng.exe ef135e02cd07e94c493061950ea99a3e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef135e02cd07e94c493061950ea99a3e.exe"C:\Users\Admin\AppData\Local\Temp\ef135e02cd07e94c493061950ea99a3e.exe"1⤵
- Drops file in Windows directory
-
C:\Windows\system32\taskeng.exetaskeng.exe {4F961541-B8E6-4652-AFE2-DE4D9B81C850} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ef135e02cd07e94c493061950ea99a3e.exeC:\Users\Admin\AppData\Local\Temp\ef135e02cd07e94c493061950ea99a3e.exe start2⤵
- Drops file in Windows directory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/540-60-0x0000000075A71000-0x0000000075A73000-memory.dmpFilesize
8KB
-
memory/540-62-0x0000000000380000-0x0000000000385000-memory.dmpFilesize
20KB
-
memory/540-61-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/540-63-0x0000000000400000-0x0000000000489000-memory.dmpFilesize
548KB
-
memory/824-64-0x0000000000000000-mapping.dmp
-
memory/824-66-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/824-68-0x0000000000400000-0x0000000000489000-memory.dmpFilesize
548KB