Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
18-11-2021 19:27
Static task
static1
Behavioral task
behavioral1
Sample
1d2d5950861d191f0cf126bf80e1857e.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1d2d5950861d191f0cf126bf80e1857e.exe
Resource
win11
windows11_x64
0 signatures
0 seconds
General
-
Target
1d2d5950861d191f0cf126bf80e1857e.exe
-
Size
156KB
-
MD5
1d2d5950861d191f0cf126bf80e1857e
-
SHA1
d7161ac371c18a87023ce37036bcd25d09d7baa4
-
SHA256
74bc8cc794e98d78ac8e4d6eac70cec70e4c8b1359e53e48f653cac84bafdae0
-
SHA512
d189722b83816fcf20bea216e9da1832d44fffe52d5d7c06564f1505d8ccfc15f1cbe106260a14f4a8858eeba047d519a3e46d6e87cef3ffe630c2d1cb42cc63
Malware Config
Extracted
Family
systembc
C2
91.212.150.113:4199
192.53.123.202:4199
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
1d2d5950861d191f0cf126bf80e1857e.exedescription ioc process File created C:\Windows\Tasks\wow64.job 1d2d5950861d191f0cf126bf80e1857e.exe File opened for modification C:\Windows\Tasks\wow64.job 1d2d5950861d191f0cf126bf80e1857e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d2d5950861d191f0cf126bf80e1857e.exe"C:\Users\Admin\AppData\Local\Temp\1d2d5950861d191f0cf126bf80e1857e.exe"1⤵
- Drops file in Windows directory
PID:3172
-
C:\Users\Admin\AppData\Local\Temp\1d2d5950861d191f0cf126bf80e1857e.exeC:\Users\Admin\AppData\Local\Temp\1d2d5950861d191f0cf126bf80e1857e.exe start1⤵PID:640