Analysis
-
max time kernel
128s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
19-11-2021 14:34
Static task
static1
Behavioral task
behavioral1
Sample
soc.exe
Resource
win7-en-20211014
General
-
Target
soc.exe
-
Size
149KB
-
MD5
23e0db71f3d2182bb78ed5aaed6dbe31
-
SHA1
bdd3f63038f0c5cb80812289694da6e1d81b74ed
-
SHA256
1f65b5b41f6821ecb05aa14f391939ad2d527c7b1b48c377a5a4647051c5ae84
-
SHA512
03964f4dae03248bf3458d15334046632fc7ccc843f23f2b628a0e52aa162a347dfc5d7dd8307e98fa4e1cd17e9aa597513286859a6fbc2f9a124f9b54723ff3
Malware Config
Extracted
systembc
45.156.26.59:4179
217.182.46.152:4179
Signatures
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
dhifaxv.exedhifaxv.exepid process 1624 dhifaxv.exe 1824 dhifaxv.exe -
Deletes itself 1 IoCs
Processes:
dhifaxv.exepid process 1624 dhifaxv.exe -
Drops file in Windows directory 5 IoCs
Processes:
soc.exedhifaxv.exesoc.exedescription ioc process File created C:\Windows\Tasks\hhjhcqsrmgbxsjewrlg.job soc.exe File created C:\Windows\Tasks\wow64.job dhifaxv.exe File opened for modification C:\Windows\Tasks\wow64.job dhifaxv.exe File created C:\Windows\Tasks\wow64.job soc.exe File opened for modification C:\Windows\Tasks\wow64.job soc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
taskeng.exedescription pid process target process PID 1420 wrote to memory of 1416 1420 taskeng.exe soc.exe PID 1420 wrote to memory of 1416 1420 taskeng.exe soc.exe PID 1420 wrote to memory of 1416 1420 taskeng.exe soc.exe PID 1420 wrote to memory of 1416 1420 taskeng.exe soc.exe PID 1420 wrote to memory of 1624 1420 taskeng.exe dhifaxv.exe PID 1420 wrote to memory of 1624 1420 taskeng.exe dhifaxv.exe PID 1420 wrote to memory of 1624 1420 taskeng.exe dhifaxv.exe PID 1420 wrote to memory of 1624 1420 taskeng.exe dhifaxv.exe PID 1420 wrote to memory of 1824 1420 taskeng.exe dhifaxv.exe PID 1420 wrote to memory of 1824 1420 taskeng.exe dhifaxv.exe PID 1420 wrote to memory of 1824 1420 taskeng.exe dhifaxv.exe PID 1420 wrote to memory of 1824 1420 taskeng.exe dhifaxv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\soc.exe"C:\Users\Admin\AppData\Local\Temp\soc.exe"1⤵
- Drops file in Windows directory
PID:1128
-
C:\Windows\system32\taskeng.exetaskeng.exe {80D013EE-5E4B-4FC9-817B-79654DF2FCD7} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\soc.exeC:\Users\Admin\AppData\Local\Temp\soc.exe start2⤵
- Drops file in Windows directory
PID:1416
-
-
C:\Windows\TEMP\dhifaxv.exeC:\Windows\TEMP\dhifaxv.exe2⤵
- Executes dropped EXE
- Deletes itself
- Drops file in Windows directory
PID:1624
-
-
C:\Windows\TEMP\dhifaxv.exeC:\Windows\TEMP\dhifaxv.exe start2⤵
- Executes dropped EXE
PID:1824
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
23e0db71f3d2182bb78ed5aaed6dbe31
SHA1bdd3f63038f0c5cb80812289694da6e1d81b74ed
SHA2561f65b5b41f6821ecb05aa14f391939ad2d527c7b1b48c377a5a4647051c5ae84
SHA51203964f4dae03248bf3458d15334046632fc7ccc843f23f2b628a0e52aa162a347dfc5d7dd8307e98fa4e1cd17e9aa597513286859a6fbc2f9a124f9b54723ff3
-
MD5
009491ed0a41b761254a91eaa6c77459
SHA187426319729e7223e831ab55512c45117bb03a04
SHA2562c58b3e7e3d70dd2250ffe7f92acd8f37417f9240cfb8849ffd4c841a3a4216c
SHA51204e7c3cea156da7de2f6c8bc4faedcc4eb4bf967a44546d66f1e6b310ebd0a8c2739c3e4ca1fb72edafedc2671b4f86356b7a59b05a82debb4f70296d48941fd
-
MD5
23e0db71f3d2182bb78ed5aaed6dbe31
SHA1bdd3f63038f0c5cb80812289694da6e1d81b74ed
SHA2561f65b5b41f6821ecb05aa14f391939ad2d527c7b1b48c377a5a4647051c5ae84
SHA51203964f4dae03248bf3458d15334046632fc7ccc843f23f2b628a0e52aa162a347dfc5d7dd8307e98fa4e1cd17e9aa597513286859a6fbc2f9a124f9b54723ff3
-
MD5
23e0db71f3d2182bb78ed5aaed6dbe31
SHA1bdd3f63038f0c5cb80812289694da6e1d81b74ed
SHA2561f65b5b41f6821ecb05aa14f391939ad2d527c7b1b48c377a5a4647051c5ae84
SHA51203964f4dae03248bf3458d15334046632fc7ccc843f23f2b628a0e52aa162a347dfc5d7dd8307e98fa4e1cd17e9aa597513286859a6fbc2f9a124f9b54723ff3