Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
04-07-2021 12:30
Static task
static1
Behavioral task
behavioral1
Sample
1b457c64a5bb3a25bfae25a686cfcee0.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
1b457c64a5bb3a25bfae25a686cfcee0.exe
-
Size
515KB
-
MD5
1b457c64a5bb3a25bfae25a686cfcee0
-
SHA1
275a27c5500e0471780abb90d8c58feb0d5f251f
-
SHA256
bc37b9feb0202a795c125de0396621dd839f21e4c7e4dd598c452f45cf803e97
-
SHA512
7238e332e16886e1c8147ca8ed42f5c88fbf1bbb24d0dcd30748b3e4b817a5841bfdb0f4c4450c62b647da4ef53307691f11183819ff5d6b451933af14c4ace1
Malware Config
Extracted
Family
systembc
C2
185.215.113.32:4000
78.47.64.46:4000
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
1b457c64a5bb3a25bfae25a686cfcee0.exedescription ioc process File created C:\Windows\Tasks\wow64.job 1b457c64a5bb3a25bfae25a686cfcee0.exe File opened for modification C:\Windows\Tasks\wow64.job 1b457c64a5bb3a25bfae25a686cfcee0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1796 wrote to memory of 1064 1796 taskeng.exe 1b457c64a5bb3a25bfae25a686cfcee0.exe PID 1796 wrote to memory of 1064 1796 taskeng.exe 1b457c64a5bb3a25bfae25a686cfcee0.exe PID 1796 wrote to memory of 1064 1796 taskeng.exe 1b457c64a5bb3a25bfae25a686cfcee0.exe PID 1796 wrote to memory of 1064 1796 taskeng.exe 1b457c64a5bb3a25bfae25a686cfcee0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b457c64a5bb3a25bfae25a686cfcee0.exe"C:\Users\Admin\AppData\Local\Temp\1b457c64a5bb3a25bfae25a686cfcee0.exe"1⤵
- Drops file in Windows directory
-
C:\Windows\system32\taskeng.exetaskeng.exe {4268982B-17B6-481D-8980-52C2C91D24E3} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1b457c64a5bb3a25bfae25a686cfcee0.exeC:\Users\Admin\AppData\Local\Temp\1b457c64a5bb3a25bfae25a686cfcee0.exe start2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1064-64-0x0000000000000000-mapping.dmp
-
memory/1064-66-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/1064-68-0x0000000000400000-0x0000000000488000-memory.dmpFilesize
544KB
-
memory/1348-60-0x00000000762C1000-0x00000000762C3000-memory.dmpFilesize
8KB
-
memory/1348-62-0x0000000000490000-0x0000000000495000-memory.dmpFilesize
20KB
-
memory/1348-61-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1348-63-0x0000000000400000-0x0000000000488000-memory.dmpFilesize
544KB