Analysis
-
max time kernel
149s -
max time network
185s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
13-08-2021 14:45
Static task
static1
Behavioral task
behavioral1
Sample
e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe
Resource
win7v20210408
General
-
Target
e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe
-
Size
30KB
-
MD5
e568e52939c93b06ae050223ae4645c5
-
SHA1
b390b43d557a2364c8848ec598850cb5d4bc5a1b
-
SHA256
e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822
-
SHA512
edcade4cab931b87bf5f347e57807f37bd5fb6ef90e132a59e84f82a853c4a1ca3413cbe0e31cb18952dd971b0fbd92a34f416607152beefc9d0e868105ebaa3
Malware Config
Extracted
systembc
bookingswarfaces.com:4035
bookingswarfacesec.com:4035
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
xvuwrvt.exepid process 1548 xvuwrvt.exe -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 69 api.ipify.org 70 api.ipify.org 8 api.ipify.org 9 api.ipify.org 28 api.ipify.org 29 api.ipify.org 50 api.ipify.org 51 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exedescription ioc process File created C:\Windows\Tasks\xvuwrvt.job e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe File opened for modification C:\Windows\Tasks\xvuwrvt.job e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exepid process 1104 e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1640 wrote to memory of 1548 1640 taskeng.exe xvuwrvt.exe PID 1640 wrote to memory of 1548 1640 taskeng.exe xvuwrvt.exe PID 1640 wrote to memory of 1548 1640 taskeng.exe xvuwrvt.exe PID 1640 wrote to memory of 1548 1640 taskeng.exe xvuwrvt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe"C:\Users\Admin\AppData\Local\Temp\e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1104
-
C:\Windows\system32\taskeng.exetaskeng.exe {8981F898-9B55-4FC6-8186-2EC0DD7FE5DB} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\ProgramData\whafs\xvuwrvt.exeC:\ProgramData\whafs\xvuwrvt.exe start2⤵
- Executes dropped EXE
PID:1548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e568e52939c93b06ae050223ae4645c5
SHA1b390b43d557a2364c8848ec598850cb5d4bc5a1b
SHA256e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822
SHA512edcade4cab931b87bf5f347e57807f37bd5fb6ef90e132a59e84f82a853c4a1ca3413cbe0e31cb18952dd971b0fbd92a34f416607152beefc9d0e868105ebaa3
-
MD5
e568e52939c93b06ae050223ae4645c5
SHA1b390b43d557a2364c8848ec598850cb5d4bc5a1b
SHA256e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822
SHA512edcade4cab931b87bf5f347e57807f37bd5fb6ef90e132a59e84f82a853c4a1ca3413cbe0e31cb18952dd971b0fbd92a34f416607152beefc9d0e868105ebaa3