Analysis
-
max time kernel
63s -
max time network
141s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
06-07-2021 16:09
Static task
static1
Behavioral task
behavioral1
Sample
25f45cc971d7ee1d763f69508676f1c2.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
25f45cc971d7ee1d763f69508676f1c2.exe
-
Size
780KB
-
MD5
25f45cc971d7ee1d763f69508676f1c2
-
SHA1
4049dbeb342a4f9f65c56591301e4993bdcbf889
-
SHA256
c9f396388822102ed458dacc4b059a46c69ba11cb8b0785b9fb2ce8285abeb42
-
SHA512
bb0210d17b79b1b9397c64db2833c52f3c49579e991823a2a9b473659da67d4fa484f6de4181f78ec85dcdf89fb5f4a2f1190ca96235c1dae11739de6c4a91a5
Malware Config
Extracted
Family
systembc
C2
185.215.113.32:4000
78.47.64.46:4000
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
25f45cc971d7ee1d763f69508676f1c2.exedescription ioc process File opened for modification C:\Windows\Tasks\wow64.job 25f45cc971d7ee1d763f69508676f1c2.exe File created C:\Windows\Tasks\wow64.job 25f45cc971d7ee1d763f69508676f1c2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1768 wrote to memory of 1760 1768 taskeng.exe 25f45cc971d7ee1d763f69508676f1c2.exe PID 1768 wrote to memory of 1760 1768 taskeng.exe 25f45cc971d7ee1d763f69508676f1c2.exe PID 1768 wrote to memory of 1760 1768 taskeng.exe 25f45cc971d7ee1d763f69508676f1c2.exe PID 1768 wrote to memory of 1760 1768 taskeng.exe 25f45cc971d7ee1d763f69508676f1c2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25f45cc971d7ee1d763f69508676f1c2.exe"C:\Users\Admin\AppData\Local\Temp\25f45cc971d7ee1d763f69508676f1c2.exe"1⤵
- Drops file in Windows directory
PID:1420
-
C:\Windows\system32\taskeng.exetaskeng.exe {E351CF6A-F2AA-4E7E-AA82-FBA0068DB522} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\25f45cc971d7ee1d763f69508676f1c2.exeC:\Users\Admin\AppData\Local\Temp\25f45cc971d7ee1d763f69508676f1c2.exe start2⤵PID:1760
-