Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
18-01-2022 13:27
Static task
static1
General
-
Target
b297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf.exe
-
Size
713KB
-
MD5
a692018d2b9c401318fe8e49903c8e7f
-
SHA1
c443761f15cd362b6aff6aa1dc17a3127e9527a6
-
SHA256
b297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf
-
SHA512
4be1b1a95c56cdb9e2b0e9c3ca4b235911da1c4a881f37d44ced0bc55a6a49b64244814089487c23a90a360a9f4eb57005efb2b0cdd668ef5df1afd03b0e5baa
Malware Config
Extracted
systembc
mainscpnl.xyz:4207
backpscpnl.xyz:4207
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
xxxd.exexxxd.exepid process 4268 xxxd.exe 1040 xxxd.exe -
Deletes itself 1 IoCs
Processes:
xxxd.exepid process 4268 xxxd.exe -
Drops file in System32 directory 6 IoCs
Processes:
b297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf.exexxxd.exexxxd.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\.obs32\{49E7EF38-38264034-163ACEA1-2953F590}.Language b297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Obsidium\{49E7EF38-38264034-163ACEA1-2953F590}.Extensions xxxd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\.obs32\{49E7EF38-38264034-163ACEA1-2953F590}.Language xxxd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Obsidium\{49E7EF38-38264034-163ACEA1-2953F590}.Extensions xxxd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\.obs32\{49E7EF38-38264034-163ACEA1-2953F590}.Language xxxd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Obsidium\{49E7EF38-38264034-163ACEA1-2953F590}.Extensions b297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf.exe -
Drops file in Windows directory 5 IoCs
Processes:
xxxd.exeb297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf.exeb297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf.exedescription ioc process File created C:\Windows\Tasks\wow64.job xxxd.exe File opened for modification C:\Windows\Tasks\wow64.job xxxd.exe File created C:\Windows\Tasks\wow64.job b297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf.exe File opened for modification C:\Windows\Tasks\wow64.job b297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf.exe File created C:\Windows\Tasks\albtmfwcunuaruorlev.job b297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf.exe"C:\Users\Admin\AppData\Local\Temp\b297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf.exe"1⤵
- Drops file in Windows directory
PID:3604
-
C:\Users\Admin\AppData\Local\Temp\b297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf.exeC:\Users\Admin\AppData\Local\Temp\b297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf.exe start1⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:4056
-
C:\Windows\TEMP\xxxd.exeC:\Windows\TEMP\xxxd.exe1⤵
- Executes dropped EXE
- Deletes itself
- Drops file in System32 directory
- Drops file in Windows directory
PID:4268
-
C:\Windows\TEMP\xxxd.exeC:\Windows\TEMP\xxxd.exe start1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1040
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a692018d2b9c401318fe8e49903c8e7f
SHA1c443761f15cd362b6aff6aa1dc17a3127e9527a6
SHA256b297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf
SHA5124be1b1a95c56cdb9e2b0e9c3ca4b235911da1c4a881f37d44ced0bc55a6a49b64244814089487c23a90a360a9f4eb57005efb2b0cdd668ef5df1afd03b0e5baa
-
MD5
692c72168532f49377781597a9b56492
SHA1488df085d3e696ed07d4da9804dc69ec7e945e15
SHA25666bb3e439c03952c4d22398cd7fc5d02002fc05c4aad3985a50dcc02bf08315b
SHA512b552358dc8890e371a5c997c90dccf2545aede7fd22c081c6fde93b811cd89e3ca22c45330c2ee7f3cb3140dedd6d05330f9eb20eaf88d275f04b4bfe92b5a90
-
MD5
a692018d2b9c401318fe8e49903c8e7f
SHA1c443761f15cd362b6aff6aa1dc17a3127e9527a6
SHA256b297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf
SHA5124be1b1a95c56cdb9e2b0e9c3ca4b235911da1c4a881f37d44ced0bc55a6a49b64244814089487c23a90a360a9f4eb57005efb2b0cdd668ef5df1afd03b0e5baa
-
MD5
a692018d2b9c401318fe8e49903c8e7f
SHA1c443761f15cd362b6aff6aa1dc17a3127e9527a6
SHA256b297268489b285cb347ca9a7efc9339d36505e61bfd9b29719321e4164c8c9cf
SHA5124be1b1a95c56cdb9e2b0e9c3ca4b235911da1c4a881f37d44ced0bc55a6a49b64244814089487c23a90a360a9f4eb57005efb2b0cdd668ef5df1afd03b0e5baa