Analysis
-
max time kernel
150s -
max time network
59s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
03-06-2021 10:05
Static task
static1
Behavioral task
behavioral1
Sample
5350c1492b2359b71a31ba103cc19b4f.exe
Resource
win7v20210410
General
-
Target
5350c1492b2359b71a31ba103cc19b4f.exe
-
Size
886KB
-
MD5
5350c1492b2359b71a31ba103cc19b4f
-
SHA1
67b81cec1269523057aac6db028b33955bffc735
-
SHA256
e90fa8b16a3e943baf7882ce978b4903c3012be94370e99eb0560bb8e970d682
-
SHA512
6d0c70987524b698bf7e8cb78cfa247078810938535ff569dd9691ed6d5e8fbea703bf62180e07e624fda13c732db226d3f2231c48e3c698e5338cfb5f253f80
Malware Config
Extracted
systembc
88.198.147.80:4174
78.47.64.46:4174
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
nslhh.exenslhh.exenslhh.exepid process 780 nslhh.exe 612 nslhh.exe 1576 nslhh.exe -
Drops file in Windows directory 5 IoCs
Processes:
5350c1492b2359b71a31ba103cc19b4f.exe5350c1492b2359b71a31ba103cc19b4f.exenslhh.exedescription ioc process File opened for modification C:\Windows\Tasks\wow64.job 5350c1492b2359b71a31ba103cc19b4f.exe File created C:\Windows\Tasks\ohjdsnbulgsnexlgvqe.job 5350c1492b2359b71a31ba103cc19b4f.exe File created C:\Windows\Tasks\wow64.job nslhh.exe File opened for modification C:\Windows\Tasks\wow64.job nslhh.exe File created C:\Windows\Tasks\wow64.job 5350c1492b2359b71a31ba103cc19b4f.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
taskeng.exedescription pid process target process PID 1444 wrote to memory of 1644 1444 taskeng.exe 5350c1492b2359b71a31ba103cc19b4f.exe PID 1444 wrote to memory of 1644 1444 taskeng.exe 5350c1492b2359b71a31ba103cc19b4f.exe PID 1444 wrote to memory of 1644 1444 taskeng.exe 5350c1492b2359b71a31ba103cc19b4f.exe PID 1444 wrote to memory of 1644 1444 taskeng.exe 5350c1492b2359b71a31ba103cc19b4f.exe PID 1444 wrote to memory of 780 1444 taskeng.exe nslhh.exe PID 1444 wrote to memory of 780 1444 taskeng.exe nslhh.exe PID 1444 wrote to memory of 780 1444 taskeng.exe nslhh.exe PID 1444 wrote to memory of 780 1444 taskeng.exe nslhh.exe PID 1444 wrote to memory of 612 1444 taskeng.exe nslhh.exe PID 1444 wrote to memory of 612 1444 taskeng.exe nslhh.exe PID 1444 wrote to memory of 612 1444 taskeng.exe nslhh.exe PID 1444 wrote to memory of 612 1444 taskeng.exe nslhh.exe PID 1444 wrote to memory of 1576 1444 taskeng.exe nslhh.exe PID 1444 wrote to memory of 1576 1444 taskeng.exe nslhh.exe PID 1444 wrote to memory of 1576 1444 taskeng.exe nslhh.exe PID 1444 wrote to memory of 1576 1444 taskeng.exe nslhh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5350c1492b2359b71a31ba103cc19b4f.exe"C:\Users\Admin\AppData\Local\Temp\5350c1492b2359b71a31ba103cc19b4f.exe"1⤵
- Drops file in Windows directory
-
C:\Windows\system32\taskeng.exetaskeng.exe {82CA5EDC-9994-49D9-846A-DED43456FE4B} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5350c1492b2359b71a31ba103cc19b4f.exeC:\Users\Admin\AppData\Local\Temp\5350c1492b2359b71a31ba103cc19b4f.exe start2⤵
- Drops file in Windows directory
-
C:\Windows\TEMP\nslhh.exeC:\Windows\TEMP\nslhh.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\TEMP\nslhh.exeC:\Windows\TEMP\nslhh.exe start2⤵
- Executes dropped EXE
-
C:\Windows\TEMP\nslhh.exeC:\Windows\TEMP\nslhh.exe start2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\TEMP\nslhh.exeMD5
5fc8b735442c0761d95300c3ab2cd3f1
SHA10c68b66cd251825596f6a9dbcd9cd664401012c8
SHA25636373b5af4c8b64bff18ae7d2079da5b3cfb6371def687327d9487adb0de345d
SHA512a49c999e918a1a68ef64bb4ea3d57c4be1a3e1a35ebb4fb603291dc78b45a408202bd40d95b0adb382ae82fffb30d5ce7ffec11db4b108199d62c77d3b6fe797
-
C:\Windows\Tasks\wow64.jobMD5
33e5245ea2b5c1f2d1d416f992d38554
SHA1b505483513ceda8864990f13cc6acbc08dfd2cc2
SHA256275e1a20106903a6dd2c4c14fb58cd36eb480b1d2c17ddff9abf57c80e89494e
SHA5121a21a93458ff8fda7e14c4574e5e69b5a8ee9fcab185e1803099af10d5734d5290fc208c46f33f518988d8cf24ac85d03c8f64d4f8a4e251dce6140ec49af018
-
C:\Windows\Temp\nslhh.exeMD5
5fc8b735442c0761d95300c3ab2cd3f1
SHA10c68b66cd251825596f6a9dbcd9cd664401012c8
SHA25636373b5af4c8b64bff18ae7d2079da5b3cfb6371def687327d9487adb0de345d
SHA512a49c999e918a1a68ef64bb4ea3d57c4be1a3e1a35ebb4fb603291dc78b45a408202bd40d95b0adb382ae82fffb30d5ce7ffec11db4b108199d62c77d3b6fe797
-
C:\Windows\Temp\nslhh.exeMD5
5fc8b735442c0761d95300c3ab2cd3f1
SHA10c68b66cd251825596f6a9dbcd9cd664401012c8
SHA25636373b5af4c8b64bff18ae7d2079da5b3cfb6371def687327d9487adb0de345d
SHA512a49c999e918a1a68ef64bb4ea3d57c4be1a3e1a35ebb4fb603291dc78b45a408202bd40d95b0adb382ae82fffb30d5ce7ffec11db4b108199d62c77d3b6fe797
-
C:\Windows\Temp\nslhh.exeMD5
5fc8b735442c0761d95300c3ab2cd3f1
SHA10c68b66cd251825596f6a9dbcd9cd664401012c8
SHA25636373b5af4c8b64bff18ae7d2079da5b3cfb6371def687327d9487adb0de345d
SHA512a49c999e918a1a68ef64bb4ea3d57c4be1a3e1a35ebb4fb603291dc78b45a408202bd40d95b0adb382ae82fffb30d5ce7ffec11db4b108199d62c77d3b6fe797
-
memory/612-79-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/612-81-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/612-76-0x0000000000000000-mapping.dmp
-
memory/780-75-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/780-69-0x0000000000000000-mapping.dmp
-
memory/1048-59-0x0000000075721000-0x0000000075723000-memory.dmpFilesize
8KB
-
memory/1048-62-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/1048-60-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1048-61-0x0000000000260000-0x0000000000265000-memory.dmpFilesize
20KB
-
memory/1576-82-0x0000000000000000-mapping.dmp
-
memory/1576-85-0x00000000002F0000-0x00000000002F1000-memory.dmpFilesize
4KB
-
memory/1576-87-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/1644-63-0x0000000000000000-mapping.dmp
-
memory/1644-65-0x00000000002F0000-0x00000000002F1000-memory.dmpFilesize
4KB
-
memory/1644-67-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB