Analysis
-
max time kernel
61s -
max time network
144s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
06-07-2021 17:14
Static task
static1
Behavioral task
behavioral1
Sample
25f45cc971d7ee1d763f69508676f1c2.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
25f45cc971d7ee1d763f69508676f1c2.exe
-
Size
780KB
-
MD5
25f45cc971d7ee1d763f69508676f1c2
-
SHA1
4049dbeb342a4f9f65c56591301e4993bdcbf889
-
SHA256
c9f396388822102ed458dacc4b059a46c69ba11cb8b0785b9fb2ce8285abeb42
-
SHA512
bb0210d17b79b1b9397c64db2833c52f3c49579e991823a2a9b473659da67d4fa484f6de4181f78ec85dcdf89fb5f4a2f1190ca96235c1dae11739de6c4a91a5
Malware Config
Extracted
Family
systembc
C2
185.215.113.32:4000
78.47.64.46:4000
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
25f45cc971d7ee1d763f69508676f1c2.exedescription ioc process File created C:\Windows\Tasks\wow64.job 25f45cc971d7ee1d763f69508676f1c2.exe File opened for modification C:\Windows\Tasks\wow64.job 25f45cc971d7ee1d763f69508676f1c2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25f45cc971d7ee1d763f69508676f1c2.exe"C:\Users\Admin\AppData\Local\Temp\25f45cc971d7ee1d763f69508676f1c2.exe"1⤵
- Drops file in Windows directory
PID:1016
-
C:\Users\Admin\AppData\Local\Temp\25f45cc971d7ee1d763f69508676f1c2.exeC:\Users\Admin\AppData\Local\Temp\25f45cc971d7ee1d763f69508676f1c2.exe start1⤵PID:2576