Analysis
-
max time kernel
61s -
max time network
175s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
09-07-2021 08:24
Static task
static1
Behavioral task
behavioral1
Sample
7f17f223e4da250bfe4bfff2fc91bc13.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
7f17f223e4da250bfe4bfff2fc91bc13.exe
-
Size
718KB
-
MD5
7f17f223e4da250bfe4bfff2fc91bc13
-
SHA1
1172ef0932115441dec43378f15d74f42fdb1d42
-
SHA256
12acd7745d22a1b295e3fd96e3994a2a36d456df3cab6f3493942c79e942a43b
-
SHA512
8db28083b68fb8283d3a22ee2c59c5d9b1471bd2c0448a0f63ab2373b05a87e991b7601d2e4d4e7e26865403823f6c7d4c7c367ee52b28d5da2b9b93318193c0
Malware Config
Extracted
Family
systembc
C2
185.215.113.32:4000
78.47.64.46:4000
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
7f17f223e4da250bfe4bfff2fc91bc13.exedescription ioc process File created C:\Windows\Tasks\wow64.job 7f17f223e4da250bfe4bfff2fc91bc13.exe File opened for modification C:\Windows\Tasks\wow64.job 7f17f223e4da250bfe4bfff2fc91bc13.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1552 wrote to memory of 1368 1552 taskeng.exe 7f17f223e4da250bfe4bfff2fc91bc13.exe PID 1552 wrote to memory of 1368 1552 taskeng.exe 7f17f223e4da250bfe4bfff2fc91bc13.exe PID 1552 wrote to memory of 1368 1552 taskeng.exe 7f17f223e4da250bfe4bfff2fc91bc13.exe PID 1552 wrote to memory of 1368 1552 taskeng.exe 7f17f223e4da250bfe4bfff2fc91bc13.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f17f223e4da250bfe4bfff2fc91bc13.exe"C:\Users\Admin\AppData\Local\Temp\7f17f223e4da250bfe4bfff2fc91bc13.exe"1⤵
- Drops file in Windows directory
PID:1180
-
C:\Windows\system32\taskeng.exetaskeng.exe {6A37D9D6-A723-48B3-A3AB-6CC455FFB709} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\7f17f223e4da250bfe4bfff2fc91bc13.exeC:\Users\Admin\AppData\Local\Temp\7f17f223e4da250bfe4bfff2fc91bc13.exe start2⤵PID:1368
-