Resubmissions
27-12-2021 06:52
211227-hnfm8accf6 1027-10-2021 06:35
211027-hcvb8sagg8 1025-10-2021 05:54
211025-gl6wysgegl 10Analysis
-
max time kernel
117s -
max time network
136s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
27-10-2021 06:35
Static task
static1
Behavioral task
behavioral1
Sample
073bc58ee928f589d0ed4fc556df8d11477c29590c5239bbb02392fcfe88458c.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
073bc58ee928f589d0ed4fc556df8d11477c29590c5239bbb02392fcfe88458c.exe
-
Size
331KB
-
MD5
bf03442f038443b9e4eff1081bb51c38
-
SHA1
c0c66486acc3c13ab842cb13a2a40ce316b7fc00
-
SHA256
073bc58ee928f589d0ed4fc556df8d11477c29590c5239bbb02392fcfe88458c
-
SHA512
3eb5a6272b091e7a6a132dd09ed9d5739d67a6fc31a5289e63f4f0393288e4c44048a616c3514bddb8b0675b14c858224444d2926d38eeb1ad7a9c5d4307d733
Malware Config
Extracted
Family
systembc
C2
185.173.39.49:4001
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
073bc58ee928f589d0ed4fc556df8d11477c29590c5239bbb02392fcfe88458c.exedescription ioc process File opened for modification C:\Windows\Tasks\wow64.job 073bc58ee928f589d0ed4fc556df8d11477c29590c5239bbb02392fcfe88458c.exe File created C:\Windows\Tasks\wow64.job 073bc58ee928f589d0ed4fc556df8d11477c29590c5239bbb02392fcfe88458c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1456 wrote to memory of 1404 1456 taskeng.exe 073bc58ee928f589d0ed4fc556df8d11477c29590c5239bbb02392fcfe88458c.exe PID 1456 wrote to memory of 1404 1456 taskeng.exe 073bc58ee928f589d0ed4fc556df8d11477c29590c5239bbb02392fcfe88458c.exe PID 1456 wrote to memory of 1404 1456 taskeng.exe 073bc58ee928f589d0ed4fc556df8d11477c29590c5239bbb02392fcfe88458c.exe PID 1456 wrote to memory of 1404 1456 taskeng.exe 073bc58ee928f589d0ed4fc556df8d11477c29590c5239bbb02392fcfe88458c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\073bc58ee928f589d0ed4fc556df8d11477c29590c5239bbb02392fcfe88458c.exe"C:\Users\Admin\AppData\Local\Temp\073bc58ee928f589d0ed4fc556df8d11477c29590c5239bbb02392fcfe88458c.exe"1⤵
- Drops file in Windows directory
PID:1936
-
C:\Windows\system32\taskeng.exetaskeng.exe {B203314B-A35B-4B99-9430-72D812D0C799} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\073bc58ee928f589d0ed4fc556df8d11477c29590c5239bbb02392fcfe88458c.exeC:\Users\Admin\AppData\Local\Temp\073bc58ee928f589d0ed4fc556df8d11477c29590c5239bbb02392fcfe88458c.exe start2⤵PID:1404
-