Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
03-06-2021 09:51
Static task
static1
Behavioral task
behavioral1
Sample
5350c1492b2359b71a31ba103cc19b4f.exe
Resource
win7v20210410
0 signatures
0 seconds
General
-
Target
5350c1492b2359b71a31ba103cc19b4f.exe
-
Size
886KB
-
MD5
5350c1492b2359b71a31ba103cc19b4f
-
SHA1
67b81cec1269523057aac6db028b33955bffc735
-
SHA256
e90fa8b16a3e943baf7882ce978b4903c3012be94370e99eb0560bb8e970d682
-
SHA512
6d0c70987524b698bf7e8cb78cfa247078810938535ff569dd9691ed6d5e8fbea703bf62180e07e624fda13c732db226d3f2231c48e3c698e5338cfb5f253f80
Malware Config
Extracted
Family
systembc
C2
88.198.147.80:4174
78.47.64.46:4174
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 632 vcdbbg.exe 1160 vcdbbg.exe -
Deletes itself 1 IoCs
pid Process 632 vcdbbg.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Tasks\wow64.job 5350c1492b2359b71a31ba103cc19b4f.exe File opened for modification C:\Windows\Tasks\wow64.job 5350c1492b2359b71a31ba103cc19b4f.exe File created C:\Windows\Tasks\bqusmkbchihvxrpjhbx.job 5350c1492b2359b71a31ba103cc19b4f.exe File created C:\Windows\Tasks\wow64.job vcdbbg.exe File opened for modification C:\Windows\Tasks\wow64.job vcdbbg.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1300 1224 taskeng.exe 30 PID 1224 wrote to memory of 1300 1224 taskeng.exe 30 PID 1224 wrote to memory of 1300 1224 taskeng.exe 30 PID 1224 wrote to memory of 1300 1224 taskeng.exe 30 PID 1224 wrote to memory of 632 1224 taskeng.exe 31 PID 1224 wrote to memory of 632 1224 taskeng.exe 31 PID 1224 wrote to memory of 632 1224 taskeng.exe 31 PID 1224 wrote to memory of 632 1224 taskeng.exe 31 PID 1224 wrote to memory of 1160 1224 taskeng.exe 32 PID 1224 wrote to memory of 1160 1224 taskeng.exe 32 PID 1224 wrote to memory of 1160 1224 taskeng.exe 32 PID 1224 wrote to memory of 1160 1224 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5350c1492b2359b71a31ba103cc19b4f.exe"C:\Users\Admin\AppData\Local\Temp\5350c1492b2359b71a31ba103cc19b4f.exe"1⤵
- Drops file in Windows directory
PID:1748
-
C:\Windows\system32\taskeng.exetaskeng.exe {36EB8879-5F14-42FB-BB2B-2D3A06E03A4F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\5350c1492b2359b71a31ba103cc19b4f.exeC:\Users\Admin\AppData\Local\Temp\5350c1492b2359b71a31ba103cc19b4f.exe start2⤵
- Drops file in Windows directory
PID:1300
-
-
C:\Windows\TEMP\vcdbbg.exeC:\Windows\TEMP\vcdbbg.exe2⤵
- Executes dropped EXE
- Deletes itself
- Drops file in Windows directory
PID:632
-
-
C:\Windows\TEMP\vcdbbg.exeC:\Windows\TEMP\vcdbbg.exe start2⤵
- Executes dropped EXE
PID:1160
-