Analysis
-
max time kernel
141s -
max time network
186s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
28-10-2021 09:43
Static task
static1
Behavioral task
behavioral1
Sample
ec77832d45fd52331dc4a1c243b1a707.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
ec77832d45fd52331dc4a1c243b1a707.exe
-
Size
174KB
-
MD5
ec77832d45fd52331dc4a1c243b1a707
-
SHA1
f3dc139d71b653280b7842e56f2d0845a4316616
-
SHA256
1b1d3d6ce262d1fcef892931d10e7dd77963c0d4a8134b73dc49eced853c29e5
-
SHA512
cc00c7225a892eed4a195cbfea7c648f0287c53cf82d4acdacb8f260e46ff8a3ede75c4d0bf2470fc089bf5be6db7a36b58cd0f56651e969ac13c78e0378e2ca
Malware Config
Extracted
Family
systembc
C2
185.173.39.49:4001
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
ec77832d45fd52331dc4a1c243b1a707.exedescription ioc process File opened for modification C:\Windows\Tasks\wow64.job ec77832d45fd52331dc4a1c243b1a707.exe File created C:\Windows\Tasks\wow64.job ec77832d45fd52331dc4a1c243b1a707.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1884 wrote to memory of 1560 1884 taskeng.exe ec77832d45fd52331dc4a1c243b1a707.exe PID 1884 wrote to memory of 1560 1884 taskeng.exe ec77832d45fd52331dc4a1c243b1a707.exe PID 1884 wrote to memory of 1560 1884 taskeng.exe ec77832d45fd52331dc4a1c243b1a707.exe PID 1884 wrote to memory of 1560 1884 taskeng.exe ec77832d45fd52331dc4a1c243b1a707.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec77832d45fd52331dc4a1c243b1a707.exe"C:\Users\Admin\AppData\Local\Temp\ec77832d45fd52331dc4a1c243b1a707.exe"1⤵
- Drops file in Windows directory
PID:1112
-
C:\Windows\system32\taskeng.exetaskeng.exe {990C63A1-2314-489F-B36C-7A2621B0BCDF} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\ec77832d45fd52331dc4a1c243b1a707.exeC:\Users\Admin\AppData\Local\Temp\ec77832d45fd52331dc4a1c243b1a707.exe start2⤵PID:1560
-