Analysis
-
max time kernel
142s -
max time network
194s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
17-09-2021 16:16
Static task
static1
Behavioral task
behavioral1
Sample
62b76c6b344a690944da5a9348059f55f60ceded8f526b6c424d0ff43f8b74e5.exe
Resource
win7v20210408
General
-
Target
62b76c6b344a690944da5a9348059f55f60ceded8f526b6c424d0ff43f8b74e5.exe
-
Size
33KB
-
MD5
8363135b1c443a979ccc232d67c4db6e
-
SHA1
269208672fe7ea3a4d333fffb5ab4611d396053a
-
SHA256
62b76c6b344a690944da5a9348059f55f60ceded8f526b6c424d0ff43f8b74e5
-
SHA512
a8e395e77503d7e24145eec84ffd06c117482d378122d1748c60c4a3702d93174da6da87eafeb724e1a0776328ed45faf8c13d3fead476af6271e54028cf0fa7
Malware Config
Extracted
systembc
websitetbox.com:4035
backupboxsite.com:4035
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
hwesa.exepid process 1724 hwesa.exe -
Drops file in Windows directory 2 IoCs
Processes:
62b76c6b344a690944da5a9348059f55f60ceded8f526b6c424d0ff43f8b74e5.exedescription ioc process File created C:\Windows\Tasks\hwesa.job 62b76c6b344a690944da5a9348059f55f60ceded8f526b6c424d0ff43f8b74e5.exe File opened for modification C:\Windows\Tasks\hwesa.job 62b76c6b344a690944da5a9348059f55f60ceded8f526b6c424d0ff43f8b74e5.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
62b76c6b344a690944da5a9348059f55f60ceded8f526b6c424d0ff43f8b74e5.exepid process 1980 62b76c6b344a690944da5a9348059f55f60ceded8f526b6c424d0ff43f8b74e5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 660 wrote to memory of 1724 660 taskeng.exe hwesa.exe PID 660 wrote to memory of 1724 660 taskeng.exe hwesa.exe PID 660 wrote to memory of 1724 660 taskeng.exe hwesa.exe PID 660 wrote to memory of 1724 660 taskeng.exe hwesa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62b76c6b344a690944da5a9348059f55f60ceded8f526b6c424d0ff43f8b74e5.exe"C:\Users\Admin\AppData\Local\Temp\62b76c6b344a690944da5a9348059f55f60ceded8f526b6c424d0ff43f8b74e5.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
C:\Windows\system32\taskeng.exetaskeng.exe {A4A2E671-F7EA-438C-8432-279E8B49B89B} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\ProgramData\uiaiam\hwesa.exeC:\ProgramData\uiaiam\hwesa.exe start2⤵
- Executes dropped EXE
PID:1724
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8363135b1c443a979ccc232d67c4db6e
SHA1269208672fe7ea3a4d333fffb5ab4611d396053a
SHA25662b76c6b344a690944da5a9348059f55f60ceded8f526b6c424d0ff43f8b74e5
SHA512a8e395e77503d7e24145eec84ffd06c117482d378122d1748c60c4a3702d93174da6da87eafeb724e1a0776328ed45faf8c13d3fead476af6271e54028cf0fa7
-
MD5
8363135b1c443a979ccc232d67c4db6e
SHA1269208672fe7ea3a4d333fffb5ab4611d396053a
SHA25662b76c6b344a690944da5a9348059f55f60ceded8f526b6c424d0ff43f8b74e5
SHA512a8e395e77503d7e24145eec84ffd06c117482d378122d1748c60c4a3702d93174da6da87eafeb724e1a0776328ed45faf8c13d3fead476af6271e54028cf0fa7