Analysis
-
max time kernel
144s -
max time network
199s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
08-06-2021 06:17
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
1.exe
-
Size
886KB
-
MD5
5fc8b735442c0761d95300c3ab2cd3f1
-
SHA1
0c68b66cd251825596f6a9dbcd9cd664401012c8
-
SHA256
36373b5af4c8b64bff18ae7d2079da5b3cfb6371def687327d9487adb0de345d
-
SHA512
a49c999e918a1a68ef64bb4ea3d57c4be1a3e1a35ebb4fb603291dc78b45a408202bd40d95b0adb382ae82fffb30d5ce7ffec11db4b108199d62c77d3b6fe797
Malware Config
Extracted
Family
systembc
C2
88.198.147.80:4174
78.47.64.46:4174
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
1.exedescription ioc process File created C:\Windows\Tasks\wow64.job 1.exe File opened for modification C:\Windows\Tasks\wow64.job 1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 844 wrote to memory of 1556 844 taskeng.exe 1.exe PID 844 wrote to memory of 1556 844 taskeng.exe 1.exe PID 844 wrote to memory of 1556 844 taskeng.exe 1.exe PID 844 wrote to memory of 1556 844 taskeng.exe 1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Drops file in Windows directory
PID:856
-
C:\Windows\system32\taskeng.exetaskeng.exe {EB424072-D079-425A-AB64-ADAD21820E43} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\1.exeC:\Users\Admin\AppData\Local\Temp\1.exe start2⤵PID:1556
-