Analysis
-
max time kernel
63s -
max time network
168s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
09-07-2021 08:21
Static task
static1
Behavioral task
behavioral1
Sample
04017134f0091367122edfcb361e6295.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
04017134f0091367122edfcb361e6295.exe
-
Size
718KB
-
MD5
04017134f0091367122edfcb361e6295
-
SHA1
9b07524703418b5ebb053226caf456e76839cd20
-
SHA256
c81c687949db0da1f1024238e01723a1145c5396e55bf81b5c154587b900ac4d
-
SHA512
8289a307a02d0b49e1deb5818deafd05186da270a38844901c0d18069c486335f28f4837392aad385467ea43af22bd0a35250abeefeba5e3f79509273e58516a
Malware Config
Extracted
Family
systembc
C2
185.215.113.32:4000
78.47.64.46:4000
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
04017134f0091367122edfcb361e6295.exedescription ioc process File created C:\Windows\Tasks\wow64.job 04017134f0091367122edfcb361e6295.exe File opened for modification C:\Windows\Tasks\wow64.job 04017134f0091367122edfcb361e6295.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1732 wrote to memory of 1644 1732 taskeng.exe 04017134f0091367122edfcb361e6295.exe PID 1732 wrote to memory of 1644 1732 taskeng.exe 04017134f0091367122edfcb361e6295.exe PID 1732 wrote to memory of 1644 1732 taskeng.exe 04017134f0091367122edfcb361e6295.exe PID 1732 wrote to memory of 1644 1732 taskeng.exe 04017134f0091367122edfcb361e6295.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04017134f0091367122edfcb361e6295.exe"C:\Users\Admin\AppData\Local\Temp\04017134f0091367122edfcb361e6295.exe"1⤵
- Drops file in Windows directory
PID:1052
-
C:\Windows\system32\taskeng.exetaskeng.exe {ABFCC2A3-4BC8-476D-9F40-10CB7A671E67} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\04017134f0091367122edfcb361e6295.exeC:\Users\Admin\AppData\Local\Temp\04017134f0091367122edfcb361e6295.exe start2⤵PID:1644
-