Analysis
-
max time kernel
119s -
max time network
144s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
23-10-2021 05:35
Static task
static1
Behavioral task
behavioral1
Sample
bf03442f038443b9e4eff1081bb51c38.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
General
-
Target
bf03442f038443b9e4eff1081bb51c38.exe
-
Size
331KB
-
MD5
bf03442f038443b9e4eff1081bb51c38
-
SHA1
c0c66486acc3c13ab842cb13a2a40ce316b7fc00
-
SHA256
073bc58ee928f589d0ed4fc556df8d11477c29590c5239bbb02392fcfe88458c
-
SHA512
3eb5a6272b091e7a6a132dd09ed9d5739d67a6fc31a5289e63f4f0393288e4c44048a616c3514bddb8b0675b14c858224444d2926d38eeb1ad7a9c5d4307d733
Malware Config
Extracted
Family
systembc
C2
185.173.39.49:4001
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
bf03442f038443b9e4eff1081bb51c38.exedescription ioc process File created C:\Windows\Tasks\wow64.job bf03442f038443b9e4eff1081bb51c38.exe File opened for modification C:\Windows\Tasks\wow64.job bf03442f038443b9e4eff1081bb51c38.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1492 wrote to memory of 1872 1492 taskeng.exe bf03442f038443b9e4eff1081bb51c38.exe PID 1492 wrote to memory of 1872 1492 taskeng.exe bf03442f038443b9e4eff1081bb51c38.exe PID 1492 wrote to memory of 1872 1492 taskeng.exe bf03442f038443b9e4eff1081bb51c38.exe PID 1492 wrote to memory of 1872 1492 taskeng.exe bf03442f038443b9e4eff1081bb51c38.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf03442f038443b9e4eff1081bb51c38.exe"C:\Users\Admin\AppData\Local\Temp\bf03442f038443b9e4eff1081bb51c38.exe"1⤵
- Drops file in Windows directory
PID:1640
-
C:\Windows\system32\taskeng.exetaskeng.exe {D9822BA7-B3D0-4213-91E7-4BC55A4329A2} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\bf03442f038443b9e4eff1081bb51c38.exeC:\Users\Admin\AppData\Local\Temp\bf03442f038443b9e4eff1081bb51c38.exe start2⤵PID:1872
-