Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 08:52
Static task
static1
Behavioral task
behavioral1
Sample
ee42a34b83f4c27c57ebfa79f78d4702cdf5c845443b929b9e9d3246409aacca.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ee42a34b83f4c27c57ebfa79f78d4702cdf5c845443b929b9e9d3246409aacca.exe
Resource
win10v2004-en-20220113
General
-
Target
ee42a34b83f4c27c57ebfa79f78d4702cdf5c845443b929b9e9d3246409aacca.exe
-
Size
76KB
-
MD5
1b0c09e2348b91bcb0b3f5310789863a
-
SHA1
916420085c30d8b96a4bd93647803c0d662cce18
-
SHA256
ee42a34b83f4c27c57ebfa79f78d4702cdf5c845443b929b9e9d3246409aacca
-
SHA512
45c08923dfbb514bd6c3525d07f813954daa5254723b107e2d3ac8139366bb3304d6c681f64bb377c84cfd79a0f6f1844cc2edd68daf3901754b350b49da6e6e
Malware Config
Extracted
systembc
141.255.166.149:4125
5.188.62.165:4125
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
mdcnhh.exepid process 1340 mdcnhh.exe -
Drops file in Windows directory 2 IoCs
Processes:
ee42a34b83f4c27c57ebfa79f78d4702cdf5c845443b929b9e9d3246409aacca.exedescription ioc process File created C:\Windows\Tasks\mdcnhh.job ee42a34b83f4c27c57ebfa79f78d4702cdf5c845443b929b9e9d3246409aacca.exe File opened for modification C:\Windows\Tasks\mdcnhh.job ee42a34b83f4c27c57ebfa79f78d4702cdf5c845443b929b9e9d3246409aacca.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ee42a34b83f4c27c57ebfa79f78d4702cdf5c845443b929b9e9d3246409aacca.exepid process 804 ee42a34b83f4c27c57ebfa79f78d4702cdf5c845443b929b9e9d3246409aacca.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 524 wrote to memory of 1340 524 taskeng.exe mdcnhh.exe PID 524 wrote to memory of 1340 524 taskeng.exe mdcnhh.exe PID 524 wrote to memory of 1340 524 taskeng.exe mdcnhh.exe PID 524 wrote to memory of 1340 524 taskeng.exe mdcnhh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee42a34b83f4c27c57ebfa79f78d4702cdf5c845443b929b9e9d3246409aacca.exe"C:\Users\Admin\AppData\Local\Temp\ee42a34b83f4c27c57ebfa79f78d4702cdf5c845443b929b9e9d3246409aacca.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:804
-
C:\Windows\system32\taskeng.exetaskeng.exe {5A1461A0-2219-4DA9-AA95-694BF904D5CB} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:524 -
C:\ProgramData\kqcbpg\mdcnhh.exeC:\ProgramData\kqcbpg\mdcnhh.exe start2⤵
- Executes dropped EXE
PID:1340
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\kqcbpg\mdcnhh.exeMD5
1b0c09e2348b91bcb0b3f5310789863a
SHA1916420085c30d8b96a4bd93647803c0d662cce18
SHA256ee42a34b83f4c27c57ebfa79f78d4702cdf5c845443b929b9e9d3246409aacca
SHA51245c08923dfbb514bd6c3525d07f813954daa5254723b107e2d3ac8139366bb3304d6c681f64bb377c84cfd79a0f6f1844cc2edd68daf3901754b350b49da6e6e
-
C:\ProgramData\kqcbpg\mdcnhh.exeMD5
1b0c09e2348b91bcb0b3f5310789863a
SHA1916420085c30d8b96a4bd93647803c0d662cce18
SHA256ee42a34b83f4c27c57ebfa79f78d4702cdf5c845443b929b9e9d3246409aacca
SHA51245c08923dfbb514bd6c3525d07f813954daa5254723b107e2d3ac8139366bb3304d6c681f64bb377c84cfd79a0f6f1844cc2edd68daf3901754b350b49da6e6e
-
memory/804-54-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/804-55-0x0000000075341000-0x0000000075343000-memory.dmpFilesize
8KB
-
memory/804-56-0x00000000002E0000-0x00000000002EA000-memory.dmpFilesize
40KB
-
memory/1340-60-0x0000000000260000-0x000000000026A000-memory.dmpFilesize
40KB