Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-08-2021 14:45
Static task
static1
Behavioral task
behavioral1
Sample
e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe
Resource
win7v20210408
General
-
Target
e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe
-
Size
30KB
-
MD5
e568e52939c93b06ae050223ae4645c5
-
SHA1
b390b43d557a2364c8848ec598850cb5d4bc5a1b
-
SHA256
e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822
-
SHA512
edcade4cab931b87bf5f347e57807f37bd5fb6ef90e132a59e84f82a853c4a1ca3413cbe0e31cb18952dd971b0fbd92a34f416607152beefc9d0e868105ebaa3
Malware Config
Extracted
systembc
bookingswarfaces.com:4035
bookingswarfacesec.com:4035
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
lqobfgo.exepid process 3644 lqobfgo.exe -
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 38 api.ipify.org 57 api.ipify.org 58 api.ipify.org 77 api.ipify.org 19 api.ipify.org 20 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exedescription ioc process File created C:\Windows\Tasks\lqobfgo.job e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe File opened for modification C:\Windows\Tasks\lqobfgo.job e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exepid process 3776 e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe 3776 e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe"C:\Users\Admin\AppData\Local\Temp\e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
C:\ProgramData\ernkdgx\lqobfgo.exeC:\ProgramData\ernkdgx\lqobfgo.exe start1⤵
- Executes dropped EXE
PID:3644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e568e52939c93b06ae050223ae4645c5
SHA1b390b43d557a2364c8848ec598850cb5d4bc5a1b
SHA256e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822
SHA512edcade4cab931b87bf5f347e57807f37bd5fb6ef90e132a59e84f82a853c4a1ca3413cbe0e31cb18952dd971b0fbd92a34f416607152beefc9d0e868105ebaa3
-
MD5
e568e52939c93b06ae050223ae4645c5
SHA1b390b43d557a2364c8848ec598850cb5d4bc5a1b
SHA256e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822
SHA512edcade4cab931b87bf5f347e57807f37bd5fb6ef90e132a59e84f82a853c4a1ca3413cbe0e31cb18952dd971b0fbd92a34f416607152beefc9d0e868105ebaa3