Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
23-11-2021 08:11
Static task
static1
Behavioral task
behavioral1
Sample
23e0db71f3d2182bb78ed5aaed6dbe31.exe
Resource
win7-en-20211104
General
-
Target
23e0db71f3d2182bb78ed5aaed6dbe31.exe
-
Size
149KB
-
MD5
23e0db71f3d2182bb78ed5aaed6dbe31
-
SHA1
bdd3f63038f0c5cb80812289694da6e1d81b74ed
-
SHA256
1f65b5b41f6821ecb05aa14f391939ad2d527c7b1b48c377a5a4647051c5ae84
-
SHA512
03964f4dae03248bf3458d15334046632fc7ccc843f23f2b628a0e52aa162a347dfc5d7dd8307e98fa4e1cd17e9aa597513286859a6fbc2f9a124f9b54723ff3
Malware Config
Extracted
systembc
45.156.26.59:4179
217.182.46.152:4179
Signatures
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
lqvqmh.exelqvqmh.exepid process 1104 lqvqmh.exe 1120 lqvqmh.exe -
Deletes itself 1 IoCs
Processes:
lqvqmh.exepid process 1104 lqvqmh.exe -
Drops file in Windows directory 5 IoCs
Processes:
23e0db71f3d2182bb78ed5aaed6dbe31.exe23e0db71f3d2182bb78ed5aaed6dbe31.exelqvqmh.exedescription ioc process File created C:\Windows\Tasks\wow64.job 23e0db71f3d2182bb78ed5aaed6dbe31.exe File opened for modification C:\Windows\Tasks\wow64.job 23e0db71f3d2182bb78ed5aaed6dbe31.exe File created C:\Windows\Tasks\blqgdxtpmifbvsokhdx.job 23e0db71f3d2182bb78ed5aaed6dbe31.exe File created C:\Windows\Tasks\wow64.job lqvqmh.exe File opened for modification C:\Windows\Tasks\wow64.job lqvqmh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
taskeng.exedescription pid process target process PID 1320 wrote to memory of 1660 1320 taskeng.exe 23e0db71f3d2182bb78ed5aaed6dbe31.exe PID 1320 wrote to memory of 1660 1320 taskeng.exe 23e0db71f3d2182bb78ed5aaed6dbe31.exe PID 1320 wrote to memory of 1660 1320 taskeng.exe 23e0db71f3d2182bb78ed5aaed6dbe31.exe PID 1320 wrote to memory of 1660 1320 taskeng.exe 23e0db71f3d2182bb78ed5aaed6dbe31.exe PID 1320 wrote to memory of 1104 1320 taskeng.exe lqvqmh.exe PID 1320 wrote to memory of 1104 1320 taskeng.exe lqvqmh.exe PID 1320 wrote to memory of 1104 1320 taskeng.exe lqvqmh.exe PID 1320 wrote to memory of 1104 1320 taskeng.exe lqvqmh.exe PID 1320 wrote to memory of 1120 1320 taskeng.exe lqvqmh.exe PID 1320 wrote to memory of 1120 1320 taskeng.exe lqvqmh.exe PID 1320 wrote to memory of 1120 1320 taskeng.exe lqvqmh.exe PID 1320 wrote to memory of 1120 1320 taskeng.exe lqvqmh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23e0db71f3d2182bb78ed5aaed6dbe31.exe"C:\Users\Admin\AppData\Local\Temp\23e0db71f3d2182bb78ed5aaed6dbe31.exe"1⤵
- Drops file in Windows directory
PID:980
-
C:\Windows\system32\taskeng.exetaskeng.exe {6B183ABE-2346-4FD6-B09D-9BF694D6C277} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\23e0db71f3d2182bb78ed5aaed6dbe31.exeC:\Users\Admin\AppData\Local\Temp\23e0db71f3d2182bb78ed5aaed6dbe31.exe start2⤵
- Drops file in Windows directory
PID:1660
-
-
C:\Windows\TEMP\lqvqmh.exeC:\Windows\TEMP\lqvqmh.exe2⤵
- Executes dropped EXE
- Deletes itself
- Drops file in Windows directory
PID:1104
-
-
C:\Windows\TEMP\lqvqmh.exeC:\Windows\TEMP\lqvqmh.exe start2⤵
- Executes dropped EXE
PID:1120
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
23e0db71f3d2182bb78ed5aaed6dbe31
SHA1bdd3f63038f0c5cb80812289694da6e1d81b74ed
SHA2561f65b5b41f6821ecb05aa14f391939ad2d527c7b1b48c377a5a4647051c5ae84
SHA51203964f4dae03248bf3458d15334046632fc7ccc843f23f2b628a0e52aa162a347dfc5d7dd8307e98fa4e1cd17e9aa597513286859a6fbc2f9a124f9b54723ff3
-
MD5
d862cc6979a6dcc5b7250e38953db168
SHA11e350cb8379f8d008dffdd5bbeee5884ba1ed3b1
SHA25688fed503935834324c21b82cb401f1a33ad4dde4ce4c09383a169697acce53d6
SHA512840c0248659ab0cd9be3df61417a70226f9385951a185a17b4454ca841af202f2f3580baeb7e51a252ac9103b4445d351aa2a2f02b5e8ba64b57be0b5f3f0967
-
MD5
23e0db71f3d2182bb78ed5aaed6dbe31
SHA1bdd3f63038f0c5cb80812289694da6e1d81b74ed
SHA2561f65b5b41f6821ecb05aa14f391939ad2d527c7b1b48c377a5a4647051c5ae84
SHA51203964f4dae03248bf3458d15334046632fc7ccc843f23f2b628a0e52aa162a347dfc5d7dd8307e98fa4e1cd17e9aa597513286859a6fbc2f9a124f9b54723ff3
-
MD5
23e0db71f3d2182bb78ed5aaed6dbe31
SHA1bdd3f63038f0c5cb80812289694da6e1d81b74ed
SHA2561f65b5b41f6821ecb05aa14f391939ad2d527c7b1b48c377a5a4647051c5ae84
SHA51203964f4dae03248bf3458d15334046632fc7ccc843f23f2b628a0e52aa162a347dfc5d7dd8307e98fa4e1cd17e9aa597513286859a6fbc2f9a124f9b54723ff3