Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
18-11-2021 19:27
Static task
static1
Behavioral task
behavioral1
Sample
1d2d5950861d191f0cf126bf80e1857e.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1d2d5950861d191f0cf126bf80e1857e.exe
Resource
win11
windows11_x64
0 signatures
0 seconds
General
-
Target
1d2d5950861d191f0cf126bf80e1857e.exe
-
Size
156KB
-
MD5
1d2d5950861d191f0cf126bf80e1857e
-
SHA1
d7161ac371c18a87023ce37036bcd25d09d7baa4
-
SHA256
74bc8cc794e98d78ac8e4d6eac70cec70e4c8b1359e53e48f653cac84bafdae0
-
SHA512
d189722b83816fcf20bea216e9da1832d44fffe52d5d7c06564f1505d8ccfc15f1cbe106260a14f4a8858eeba047d519a3e46d6e87cef3ffe630c2d1cb42cc63
Malware Config
Extracted
Family
systembc
C2
91.212.150.113:4199
192.53.123.202:4199
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
1d2d5950861d191f0cf126bf80e1857e.exedescription ioc process File created C:\Windows\Tasks\wow64.job 1d2d5950861d191f0cf126bf80e1857e.exe File opened for modification C:\Windows\Tasks\wow64.job 1d2d5950861d191f0cf126bf80e1857e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 580 wrote to memory of 1908 580 taskeng.exe 1d2d5950861d191f0cf126bf80e1857e.exe PID 580 wrote to memory of 1908 580 taskeng.exe 1d2d5950861d191f0cf126bf80e1857e.exe PID 580 wrote to memory of 1908 580 taskeng.exe 1d2d5950861d191f0cf126bf80e1857e.exe PID 580 wrote to memory of 1908 580 taskeng.exe 1d2d5950861d191f0cf126bf80e1857e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d2d5950861d191f0cf126bf80e1857e.exe"C:\Users\Admin\AppData\Local\Temp\1d2d5950861d191f0cf126bf80e1857e.exe"1⤵
- Drops file in Windows directory
PID:908
-
C:\Windows\system32\taskeng.exetaskeng.exe {E8B6F811-C332-4B60-8638-8BDFF29C297F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\AppData\Local\Temp\1d2d5950861d191f0cf126bf80e1857e.exeC:\Users\Admin\AppData\Local\Temp\1d2d5950861d191f0cf126bf80e1857e.exe start2⤵PID:1908
-