Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 09:36
Static task
static1
Behavioral task
behavioral1
Sample
9ff5246727eb8baf06d825830b061df21a7e7b8ecf0f4f584da3b886643f84ed.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
9ff5246727eb8baf06d825830b061df21a7e7b8ecf0f4f584da3b886643f84ed.exe
Resource
win10v2004-en-20220112
General
-
Target
9ff5246727eb8baf06d825830b061df21a7e7b8ecf0f4f584da3b886643f84ed.exe
-
Size
95KB
-
MD5
60da44c3d55f57e19fbdc9b6e9219a0a
-
SHA1
ebe56f8ae1f7fc3e958925e0682fe4bc15bb19c9
-
SHA256
9ff5246727eb8baf06d825830b061df21a7e7b8ecf0f4f584da3b886643f84ed
-
SHA512
765c52f5eabb2012ef113f1b81a2656390fb1527124961a7a5e401550aac864a2074b0d64b34ebe5e912e70058b6a470e5bb499041bf8c775c4a04e16c419a3c
Malware Config
Extracted
systembc
31.44.184.201:4081
31.44.184.202:4081
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
irqw.exeirqw.exepid process 1468 irqw.exe 1140 irqw.exe -
Drops file in Windows directory 2 IoCs
Processes:
9ff5246727eb8baf06d825830b061df21a7e7b8ecf0f4f584da3b886643f84ed.exedescription ioc process File created C:\Windows\Tasks\irqw.job 9ff5246727eb8baf06d825830b061df21a7e7b8ecf0f4f584da3b886643f84ed.exe File opened for modification C:\Windows\Tasks\irqw.job 9ff5246727eb8baf06d825830b061df21a7e7b8ecf0f4f584da3b886643f84ed.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
9ff5246727eb8baf06d825830b061df21a7e7b8ecf0f4f584da3b886643f84ed.exepid process 1676 9ff5246727eb8baf06d825830b061df21a7e7b8ecf0f4f584da3b886643f84ed.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
taskeng.exedescription pid process target process PID 1188 wrote to memory of 1468 1188 taskeng.exe irqw.exe PID 1188 wrote to memory of 1468 1188 taskeng.exe irqw.exe PID 1188 wrote to memory of 1468 1188 taskeng.exe irqw.exe PID 1188 wrote to memory of 1468 1188 taskeng.exe irqw.exe PID 1188 wrote to memory of 1140 1188 taskeng.exe irqw.exe PID 1188 wrote to memory of 1140 1188 taskeng.exe irqw.exe PID 1188 wrote to memory of 1140 1188 taskeng.exe irqw.exe PID 1188 wrote to memory of 1140 1188 taskeng.exe irqw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ff5246727eb8baf06d825830b061df21a7e7b8ecf0f4f584da3b886643f84ed.exe"C:\Users\Admin\AppData\Local\Temp\9ff5246727eb8baf06d825830b061df21a7e7b8ecf0f4f584da3b886643f84ed.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
C:\Windows\system32\taskeng.exetaskeng.exe {EFCAE1B0-5408-41A2-A445-3BCEBECAD78B} S-1-5-21-2329389628-4064185017-3901522362-1000:QSKGHMYQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\ProgramData\aubuku\irqw.exeC:\ProgramData\aubuku\irqw.exe start22⤵
- Executes dropped EXE
PID:1468 -
C:\ProgramData\aubuku\irqw.exeC:\ProgramData\aubuku\irqw.exe start22⤵
- Executes dropped EXE
PID:1140
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\aubuku\irqw.exeMD5
60da44c3d55f57e19fbdc9b6e9219a0a
SHA1ebe56f8ae1f7fc3e958925e0682fe4bc15bb19c9
SHA2569ff5246727eb8baf06d825830b061df21a7e7b8ecf0f4f584da3b886643f84ed
SHA512765c52f5eabb2012ef113f1b81a2656390fb1527124961a7a5e401550aac864a2074b0d64b34ebe5e912e70058b6a470e5bb499041bf8c775c4a04e16c419a3c
-
C:\ProgramData\aubuku\irqw.exeMD5
60da44c3d55f57e19fbdc9b6e9219a0a
SHA1ebe56f8ae1f7fc3e958925e0682fe4bc15bb19c9
SHA2569ff5246727eb8baf06d825830b061df21a7e7b8ecf0f4f584da3b886643f84ed
SHA512765c52f5eabb2012ef113f1b81a2656390fb1527124961a7a5e401550aac864a2074b0d64b34ebe5e912e70058b6a470e5bb499041bf8c775c4a04e16c419a3c
-
C:\ProgramData\aubuku\irqw.exeMD5
60da44c3d55f57e19fbdc9b6e9219a0a
SHA1ebe56f8ae1f7fc3e958925e0682fe4bc15bb19c9
SHA2569ff5246727eb8baf06d825830b061df21a7e7b8ecf0f4f584da3b886643f84ed
SHA512765c52f5eabb2012ef113f1b81a2656390fb1527124961a7a5e401550aac864a2074b0d64b34ebe5e912e70058b6a470e5bb499041bf8c775c4a04e16c419a3c
-
memory/1140-63-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1676-55-0x0000000076141000-0x0000000076143000-memory.dmpFilesize
8KB
-
memory/1676-56-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/1676-57-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB