Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
08-12-2021 14:20
Static task
static1
Behavioral task
behavioral1
Sample
25e6923418ede3293afad2e318e302f1249323c56cbfed23c9586a7e7c1996fb.exe
Resource
win7-en-20211104
General
-
Target
25e6923418ede3293afad2e318e302f1249323c56cbfed23c9586a7e7c1996fb.exe
-
Size
148KB
-
MD5
a6bb96f7c9972db7d27a415742d57a88
-
SHA1
d8e3c322e66d714db5a947ea0804f112f7971734
-
SHA256
25e6923418ede3293afad2e318e302f1249323c56cbfed23c9586a7e7c1996fb
-
SHA512
e40fcf73f5ff1e86214d369dcd5ebc1735dba9ac5ea95a0b357fc8935061274858e9f6fd9dbf1dc9b2224424c4eebd6c79d81551ddbc78bb96371c0c903aa3ca
Malware Config
Extracted
systembc
mxblogs19.xyz:4044
sdadvert20.xyz:4044
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
bgcw.exepid process 1320 bgcw.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 6 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
25e6923418ede3293afad2e318e302f1249323c56cbfed23c9586a7e7c1996fb.exedescription ioc process File created C:\Windows\Tasks\bgcw.job 25e6923418ede3293afad2e318e302f1249323c56cbfed23c9586a7e7c1996fb.exe File opened for modification C:\Windows\Tasks\bgcw.job 25e6923418ede3293afad2e318e302f1249323c56cbfed23c9586a7e7c1996fb.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
25e6923418ede3293afad2e318e302f1249323c56cbfed23c9586a7e7c1996fb.exepid process 320 25e6923418ede3293afad2e318e302f1249323c56cbfed23c9586a7e7c1996fb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1484 wrote to memory of 1320 1484 taskeng.exe bgcw.exe PID 1484 wrote to memory of 1320 1484 taskeng.exe bgcw.exe PID 1484 wrote to memory of 1320 1484 taskeng.exe bgcw.exe PID 1484 wrote to memory of 1320 1484 taskeng.exe bgcw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25e6923418ede3293afad2e318e302f1249323c56cbfed23c9586a7e7c1996fb.exe"C:\Users\Admin\AppData\Local\Temp\25e6923418ede3293afad2e318e302f1249323c56cbfed23c9586a7e7c1996fb.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:320
-
C:\Windows\system32\taskeng.exetaskeng.exe {A8D5BFAA-37B1-4E8D-A792-A33C0000BA57} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\ProgramData\jsmrk\bgcw.exeC:\ProgramData\jsmrk\bgcw.exe start2⤵
- Executes dropped EXE
PID:1320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a6bb96f7c9972db7d27a415742d57a88
SHA1d8e3c322e66d714db5a947ea0804f112f7971734
SHA25625e6923418ede3293afad2e318e302f1249323c56cbfed23c9586a7e7c1996fb
SHA512e40fcf73f5ff1e86214d369dcd5ebc1735dba9ac5ea95a0b357fc8935061274858e9f6fd9dbf1dc9b2224424c4eebd6c79d81551ddbc78bb96371c0c903aa3ca
-
MD5
a6bb96f7c9972db7d27a415742d57a88
SHA1d8e3c322e66d714db5a947ea0804f112f7971734
SHA25625e6923418ede3293afad2e318e302f1249323c56cbfed23c9586a7e7c1996fb
SHA512e40fcf73f5ff1e86214d369dcd5ebc1735dba9ac5ea95a0b357fc8935061274858e9f6fd9dbf1dc9b2224424c4eebd6c79d81551ddbc78bb96371c0c903aa3ca