Analysis
-
max time kernel
62s -
max time network
184s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
04-07-2021 17:37
Static task
static1
Behavioral task
behavioral1
Sample
63d21a9cac7a5f2874f02137e632945e.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
63d21a9cac7a5f2874f02137e632945e.exe
-
Size
515KB
-
MD5
63d21a9cac7a5f2874f02137e632945e
-
SHA1
450d686e1c923d414ac5d4fbeff99453b4497f4c
-
SHA256
bfc410665215437c98d3fec91f281824326a73565224e9ad20685eb86c632338
-
SHA512
55b1333e893dd47b49c71e6ddde964e587be7ffdb2067bd405edfe12ff0da5f70969cffff0ff133e71d59526e7de2ee4fe8cc0eaf43cb7c1238736aa0fa97596
Malware Config
Extracted
Family
systembc
C2
185.215.113.32:4000
78.47.64.46:4000
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
63d21a9cac7a5f2874f02137e632945e.exedescription ioc process File created C:\Windows\Tasks\wow64.job 63d21a9cac7a5f2874f02137e632945e.exe File opened for modification C:\Windows\Tasks\wow64.job 63d21a9cac7a5f2874f02137e632945e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1660 wrote to memory of 1764 1660 taskeng.exe 63d21a9cac7a5f2874f02137e632945e.exe PID 1660 wrote to memory of 1764 1660 taskeng.exe 63d21a9cac7a5f2874f02137e632945e.exe PID 1660 wrote to memory of 1764 1660 taskeng.exe 63d21a9cac7a5f2874f02137e632945e.exe PID 1660 wrote to memory of 1764 1660 taskeng.exe 63d21a9cac7a5f2874f02137e632945e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63d21a9cac7a5f2874f02137e632945e.exe"C:\Users\Admin\AppData\Local\Temp\63d21a9cac7a5f2874f02137e632945e.exe"1⤵
- Drops file in Windows directory
-
C:\Windows\system32\taskeng.exetaskeng.exe {3A163CA5-72BA-4D0C-89E7-7273BDC98871} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\63d21a9cac7a5f2874f02137e632945e.exeC:\Users\Admin\AppData\Local\Temp\63d21a9cac7a5f2874f02137e632945e.exe start2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1764-63-0x0000000000000000-mapping.dmp
-
memory/1764-64-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/1764-67-0x0000000000400000-0x0000000000488000-memory.dmpFilesize
544KB
-
memory/1932-59-0x0000000074FB1000-0x0000000074FB3000-memory.dmpFilesize
8KB
-
memory/1932-61-0x0000000000280000-0x0000000000285000-memory.dmpFilesize
20KB
-
memory/1932-60-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1932-62-0x0000000000400000-0x0000000000488000-memory.dmpFilesize
544KB