Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
08-06-2021 12:05
Static task
static1
Behavioral task
behavioral1
Sample
b842433943138b902e52840647f19bc0c5361504e78f7183e956ffe9063772c6.bin.exe
Resource
win7v20210410
General
-
Target
b842433943138b902e52840647f19bc0c5361504e78f7183e956ffe9063772c6.bin.exe
-
Size
36KB
-
MD5
b4ff9334082022b24f7272b2a752dee0
-
SHA1
48805d9296173a8758587868ab5e8f3ea073759e
-
SHA256
b842433943138b902e52840647f19bc0c5361504e78f7183e956ffe9063772c6
-
SHA512
69242a365f9179ecdc8d096d2ec8055186c142b8b2576dad34899837fadc05c7bf6b805ded391552a36b8f85d4e06daf0eeea210e6bce2193a5b1f0cef7dc36e
Malware Config
Extracted
systembc
107.175.150.179:4001
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
ahwn.exeahwn.exepid process 196 ahwn.exe 2668 ahwn.exe -
Drops file in Windows directory 2 IoCs
Processes:
b842433943138b902e52840647f19bc0c5361504e78f7183e956ffe9063772c6.bin.exedescription ioc process File created C:\Windows\Tasks\ahwn.job b842433943138b902e52840647f19bc0c5361504e78f7183e956ffe9063772c6.bin.exe File opened for modification C:\Windows\Tasks\ahwn.job b842433943138b902e52840647f19bc0c5361504e78f7183e956ffe9063772c6.bin.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 936 196 WerFault.exe ahwn.exe 1284 2668 WerFault.exe ahwn.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
b842433943138b902e52840647f19bc0c5361504e78f7183e956ffe9063772c6.bin.exeWerFault.exeWerFault.exepid process 3892 b842433943138b902e52840647f19bc0c5361504e78f7183e956ffe9063772c6.bin.exe 3892 b842433943138b902e52840647f19bc0c5361504e78f7183e956ffe9063772c6.bin.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 1284 WerFault.exe 1284 WerFault.exe 1284 WerFault.exe 1284 WerFault.exe 1284 WerFault.exe 1284 WerFault.exe 1284 WerFault.exe 1284 WerFault.exe 1284 WerFault.exe 1284 WerFault.exe 1284 WerFault.exe 1284 WerFault.exe 1284 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 936 WerFault.exe Token: SeBackupPrivilege 936 WerFault.exe Token: SeDebugPrivilege 936 WerFault.exe Token: SeDebugPrivilege 1284 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b842433943138b902e52840647f19bc0c5361504e78f7183e956ffe9063772c6.bin.exe"C:\Users\Admin\AppData\Local\Temp\b842433943138b902e52840647f19bc0c5361504e78f7183e956ffe9063772c6.bin.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
C:\ProgramData\bsmdqk\ahwn.exeC:\ProgramData\bsmdqk\ahwn.exe start1⤵
- Executes dropped EXE
PID:196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 196 -s 6082⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
C:\ProgramData\bsmdqk\ahwn.exeC:\ProgramData\bsmdqk\ahwn.exe start1⤵
- Executes dropped EXE
PID:2668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 5802⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b4ff9334082022b24f7272b2a752dee0
SHA148805d9296173a8758587868ab5e8f3ea073759e
SHA256b842433943138b902e52840647f19bc0c5361504e78f7183e956ffe9063772c6
SHA51269242a365f9179ecdc8d096d2ec8055186c142b8b2576dad34899837fadc05c7bf6b805ded391552a36b8f85d4e06daf0eeea210e6bce2193a5b1f0cef7dc36e
-
MD5
b4ff9334082022b24f7272b2a752dee0
SHA148805d9296173a8758587868ab5e8f3ea073759e
SHA256b842433943138b902e52840647f19bc0c5361504e78f7183e956ffe9063772c6
SHA51269242a365f9179ecdc8d096d2ec8055186c142b8b2576dad34899837fadc05c7bf6b805ded391552a36b8f85d4e06daf0eeea210e6bce2193a5b1f0cef7dc36e
-
MD5
b4ff9334082022b24f7272b2a752dee0
SHA148805d9296173a8758587868ab5e8f3ea073759e
SHA256b842433943138b902e52840647f19bc0c5361504e78f7183e956ffe9063772c6
SHA51269242a365f9179ecdc8d096d2ec8055186c142b8b2576dad34899837fadc05c7bf6b805ded391552a36b8f85d4e06daf0eeea210e6bce2193a5b1f0cef7dc36e