Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
13-11-2021 08:33
Static task
static1
Behavioral task
behavioral1
Sample
s5.exe
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
General
-
Target
s5.exe
-
Size
185KB
-
MD5
2207d926147a8ff6327a728a32f0365f
-
SHA1
f7222a178adf853494700d6375d42adca3289c30
-
SHA256
ef464ed72b73590e6f1fe174116e925258d742e2de02a7684aa841015db767e6
-
SHA512
cc5be59c9ad4426c6cac4f5421e6f4b1335e8cc62f8bf771526394dd2ada7520c77763bc948ad7f2e6600fb6ee13a65a86c160973911a39ffee31904123d3f80
Malware Config
Extracted
Family
systembc
C2
178.20.41.173:4001
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
s5.exedescription ioc process File created C:\Windows\Tasks\wow64.job s5.exe File opened for modification C:\Windows\Tasks\wow64.job s5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1492 wrote to memory of 1616 1492 taskeng.exe s5.exe PID 1492 wrote to memory of 1616 1492 taskeng.exe s5.exe PID 1492 wrote to memory of 1616 1492 taskeng.exe s5.exe PID 1492 wrote to memory of 1616 1492 taskeng.exe s5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\s5.exe"C:\Users\Admin\AppData\Local\Temp\s5.exe"1⤵
- Drops file in Windows directory
PID:1588
-
C:\Windows\system32\taskeng.exetaskeng.exe {54E40342-6422-47A8-BCE9-75F22BB94B70} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\s5.exeC:\Users\Admin\AppData\Local\Temp\s5.exe start2⤵PID:1616
-