Analysis
-
max time kernel
119s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
13-11-2021 08:31
Static task
static1
Behavioral task
behavioral1
Sample
7.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
General
-
Target
7.exe
-
Size
185KB
-
MD5
2207d926147a8ff6327a728a32f0365f
-
SHA1
f7222a178adf853494700d6375d42adca3289c30
-
SHA256
ef464ed72b73590e6f1fe174116e925258d742e2de02a7684aa841015db767e6
-
SHA512
cc5be59c9ad4426c6cac4f5421e6f4b1335e8cc62f8bf771526394dd2ada7520c77763bc948ad7f2e6600fb6ee13a65a86c160973911a39ffee31904123d3f80
Malware Config
Extracted
Family
systembc
C2
178.20.41.173:4001
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
7.exedescription ioc process File created C:\Windows\Tasks\wow64.job 7.exe File opened for modification C:\Windows\Tasks\wow64.job 7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1044 wrote to memory of 1408 1044 taskeng.exe 7.exe PID 1044 wrote to memory of 1408 1044 taskeng.exe 7.exe PID 1044 wrote to memory of 1408 1044 taskeng.exe 7.exe PID 1044 wrote to memory of 1408 1044 taskeng.exe 7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7.exe"C:\Users\Admin\AppData\Local\Temp\7.exe"1⤵
- Drops file in Windows directory
PID:940
-
C:\Windows\system32\taskeng.exetaskeng.exe {D47D5209-F98D-4A5E-B3D1-F6717661E502} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\7.exeC:\Users\Admin\AppData\Local\Temp\7.exe start2⤵PID:1408
-