Analysis
-
max time kernel
64s -
max time network
142s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
09-07-2021 08:24
Static task
static1
Behavioral task
behavioral1
Sample
7f17f223e4da250bfe4bfff2fc91bc13.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
7f17f223e4da250bfe4bfff2fc91bc13.exe
-
Size
718KB
-
MD5
7f17f223e4da250bfe4bfff2fc91bc13
-
SHA1
1172ef0932115441dec43378f15d74f42fdb1d42
-
SHA256
12acd7745d22a1b295e3fd96e3994a2a36d456df3cab6f3493942c79e942a43b
-
SHA512
8db28083b68fb8283d3a22ee2c59c5d9b1471bd2c0448a0f63ab2373b05a87e991b7601d2e4d4e7e26865403823f6c7d4c7c367ee52b28d5da2b9b93318193c0
Malware Config
Extracted
Family
systembc
C2
185.215.113.32:4000
78.47.64.46:4000
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
7f17f223e4da250bfe4bfff2fc91bc13.exedescription ioc process File created C:\Windows\Tasks\wow64.job 7f17f223e4da250bfe4bfff2fc91bc13.exe File opened for modification C:\Windows\Tasks\wow64.job 7f17f223e4da250bfe4bfff2fc91bc13.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f17f223e4da250bfe4bfff2fc91bc13.exe"C:\Users\Admin\AppData\Local\Temp\7f17f223e4da250bfe4bfff2fc91bc13.exe"1⤵
- Drops file in Windows directory
PID:516
-
C:\Users\Admin\AppData\Local\Temp\7f17f223e4da250bfe4bfff2fc91bc13.exeC:\Users\Admin\AppData\Local\Temp\7f17f223e4da250bfe4bfff2fc91bc13.exe start1⤵PID:3520