Analysis
-
max time kernel
61s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
24-06-2021 04:14
Static task
static1
Behavioral task
behavioral1
Sample
0acb9ab7d6449949dabbc716c8b890cc.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
0acb9ab7d6449949dabbc716c8b890cc.exe
-
Size
830KB
-
MD5
0acb9ab7d6449949dabbc716c8b890cc
-
SHA1
47574d6168cf994f38844a540ee4bc21087eef88
-
SHA256
708ae5ceb7fc86d1d8d3c0597015f5e3fd4aa8af07faec1f4b75d94b2ebce6c1
-
SHA512
40217a51fb6676da16e24300badeacc2aa6c9252c4ba2f03912e86dc704fb290ae83b1f4cada8e8655f189272c8203d2d3a72d41c42fa8c817957547bb60b938
Malware Config
Extracted
Family
systembc
C2
185.215.113.32:4000
78.47.64.46:4000
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
0acb9ab7d6449949dabbc716c8b890cc.exedescription ioc process File created C:\Windows\Tasks\wow64.job 0acb9ab7d6449949dabbc716c8b890cc.exe File opened for modification C:\Windows\Tasks\wow64.job 0acb9ab7d6449949dabbc716c8b890cc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0acb9ab7d6449949dabbc716c8b890cc.exe"C:\Users\Admin\AppData\Local\Temp\0acb9ab7d6449949dabbc716c8b890cc.exe"1⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\0acb9ab7d6449949dabbc716c8b890cc.exeC:\Users\Admin\AppData\Local\Temp\0acb9ab7d6449949dabbc716c8b890cc.exe start1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2188-117-0x00000000004E0000-0x000000000062A000-memory.dmpFilesize
1.3MB
-
memory/2188-119-0x0000000000400000-0x00000000004D5000-memory.dmpFilesize
852KB
-
memory/3904-114-0x0000000000760000-0x0000000000783000-memory.dmpFilesize
140KB
-
memory/3904-115-0x00000000007C0000-0x00000000007C5000-memory.dmpFilesize
20KB
-
memory/3904-116-0x0000000000400000-0x00000000004D5000-memory.dmpFilesize
852KB