Analysis
-
max time kernel
62s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
06-07-2021 07:09
Static task
static1
Behavioral task
behavioral1
Sample
825a13bbff9b5cc4d1f19d896aa31c64.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
825a13bbff9b5cc4d1f19d896aa31c64.exe
-
Size
780KB
-
MD5
825a13bbff9b5cc4d1f19d896aa31c64
-
SHA1
a2026995b7871f84fbdd86f2596d51ce4f05f8b1
-
SHA256
78047ece6080c704f47d91545e8cce53095342a4595b9e20ee5efeba4c679e41
-
SHA512
ef52dcfecf5d916cb4eb17e03771d45d051c561c48564c114815a299cf77dd98d6547a1e2bfc3e133e2e97337b4bb258b776cadbe43a0b3beb0c987bb16d7197
Malware Config
Extracted
Family
systembc
C2
185.215.113.32:4000
78.47.64.46:4000
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
825a13bbff9b5cc4d1f19d896aa31c64.exedescription ioc process File created C:\Windows\Tasks\wow64.job 825a13bbff9b5cc4d1f19d896aa31c64.exe File opened for modification C:\Windows\Tasks\wow64.job 825a13bbff9b5cc4d1f19d896aa31c64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\825a13bbff9b5cc4d1f19d896aa31c64.exe"C:\Users\Admin\AppData\Local\Temp\825a13bbff9b5cc4d1f19d896aa31c64.exe"1⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\825a13bbff9b5cc4d1f19d896aa31c64.exeC:\Users\Admin\AppData\Local\Temp\825a13bbff9b5cc4d1f19d896aa31c64.exe start1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2388-115-0x0000000002250000-0x0000000002255000-memory.dmpFilesize
20KB
-
memory/2388-114-0x0000000002220000-0x0000000002221000-memory.dmpFilesize
4KB
-
memory/2388-116-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/4060-117-0x00000000001D0000-0x00000000001F3000-memory.dmpFilesize
140KB
-
memory/4060-119-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB