Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
27-01-2022 17:09
Static task
static1
Behavioral task
behavioral1
Sample
socks_crypt_update.exe
Resource
win7-en-20211208
General
-
Target
socks_crypt_update.exe
-
Size
317KB
-
MD5
8f94de248d86fc855da27f403fca561f
-
SHA1
0ebd03d681c58e8431c761f695e49682860137f5
-
SHA256
f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
-
SHA512
ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
Malware Config
Extracted
systembc
186.2.171.65:4001
Signatures
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
uitj.exepcxjgbx.exemofkctp.exepid process 544 uitj.exe 1384 pcxjgbx.exe 1004 mofkctp.exe -
Drops file in Windows directory 5 IoCs
Processes:
socks_crypt_update.exeuitj.exepcxjgbx.exedescription ioc process File created C:\Windows\Tasks\uitj.job socks_crypt_update.exe File opened for modification C:\Windows\Tasks\uitj.job socks_crypt_update.exe File created C:\Windows\Tasks\pwvrjphnfldjbhxfvet.job uitj.exe File created C:\Windows\Tasks\mofkctp.job pcxjgbx.exe File opened for modification C:\Windows\Tasks\mofkctp.job pcxjgbx.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
socks_crypt_update.exepcxjgbx.exepid process 1664 socks_crypt_update.exe 1384 pcxjgbx.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
taskeng.exedescription pid process target process PID 520 wrote to memory of 544 520 taskeng.exe uitj.exe PID 520 wrote to memory of 544 520 taskeng.exe uitj.exe PID 520 wrote to memory of 544 520 taskeng.exe uitj.exe PID 520 wrote to memory of 544 520 taskeng.exe uitj.exe PID 520 wrote to memory of 1384 520 taskeng.exe pcxjgbx.exe PID 520 wrote to memory of 1384 520 taskeng.exe pcxjgbx.exe PID 520 wrote to memory of 1384 520 taskeng.exe pcxjgbx.exe PID 520 wrote to memory of 1384 520 taskeng.exe pcxjgbx.exe PID 520 wrote to memory of 1004 520 taskeng.exe mofkctp.exe PID 520 wrote to memory of 1004 520 taskeng.exe mofkctp.exe PID 520 wrote to memory of 1004 520 taskeng.exe mofkctp.exe PID 520 wrote to memory of 1004 520 taskeng.exe mofkctp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\socks_crypt_update.exe"C:\Users\Admin\AppData\Local\Temp\socks_crypt_update.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
C:\Windows\system32\taskeng.exetaskeng.exe {4806D8CF-0EDB-457F-A522-9E17F08678B7} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\ProgramData\clqqiib\uitj.exeC:\ProgramData\clqqiib\uitj.exe start2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:544
-
-
C:\Windows\TEMP\pcxjgbx.exeC:\Windows\TEMP\pcxjgbx.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\ProgramData\ggtlx\mofkctp.exeC:\ProgramData\ggtlx\mofkctp.exe start2⤵
- Executes dropped EXE
PID:1004
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
-
MD5
0c8e5e1d534509e28ca6d53a0ab7c973
SHA19e722b0c6aaecb50b95a7c9188c397d36a4d52fa
SHA2569451507e3f00782339176a5215be869b5081c06a4301021b676abeb0671e571e
SHA5120ff4a33abc509becbfc949b2d56f35789dc666c2137cbbd9412635cdd9c60727b376ade69c5efd482a5f8ed0a595a050644521401f2cf2c090543c3b3961afcb
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd