Analysis
-
max time kernel
61s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-05-2021 12:51
Static task
static1
Behavioral task
behavioral1
Sample
ef135e02cd07e94c493061950ea99a3e.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
ef135e02cd07e94c493061950ea99a3e.exe
-
Size
524KB
-
MD5
ef135e02cd07e94c493061950ea99a3e
-
SHA1
1b0cbec8bc066ebe12ab6a66e8e8901c2024bf03
-
SHA256
2866a252b6007fe9487d85b87ed23f6dddaf2f4f8ccc82328212985bfc6dd5d5
-
SHA512
3654bffbf3dcecd629fda6e5c1fb1b5d41c814ed321633d8beba964341009c7be47bbccbac137e79f6a694b3dc05a18f529b5f7e0305899760a1d5e4a3c94ec3
Malware Config
Extracted
Family
systembc
C2
88.198.147.80:4174
78.47.64.46:4174
Signatures
-
Drops file in Windows directory 3 IoCs
Processes:
ef135e02cd07e94c493061950ea99a3e.exeef135e02cd07e94c493061950ea99a3e.exedescription ioc process File opened for modification C:\Windows\Tasks\wow64.job ef135e02cd07e94c493061950ea99a3e.exe File created C:\Windows\Tasks\hapukpfkaftaotjoejx.job ef135e02cd07e94c493061950ea99a3e.exe File created C:\Windows\Tasks\wow64.job ef135e02cd07e94c493061950ea99a3e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef135e02cd07e94c493061950ea99a3e.exe"C:\Users\Admin\AppData\Local\Temp\ef135e02cd07e94c493061950ea99a3e.exe"1⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\ef135e02cd07e94c493061950ea99a3e.exeC:\Users\Admin\AppData\Local\Temp\ef135e02cd07e94c493061950ea99a3e.exe start1⤵
- Drops file in Windows directory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2700-117-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/2700-119-0x0000000000400000-0x0000000000489000-memory.dmpFilesize
548KB
-
memory/3680-114-0x00000000005F0000-0x00000000005F1000-memory.dmpFilesize
4KB
-
memory/3680-115-0x0000000000620000-0x0000000000625000-memory.dmpFilesize
20KB
-
memory/3680-116-0x0000000000400000-0x0000000000489000-memory.dmpFilesize
548KB