Analysis
-
max time kernel
154s -
max time network
145s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
07-02-2022 08:29
Static task
static1
Behavioral task
behavioral1
Sample
f4c863f065eaa1fdc7124de0d94b4ca2.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
f4c863f065eaa1fdc7124de0d94b4ca2.exe
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
f4c863f065eaa1fdc7124de0d94b4ca2.exe
-
Size
140KB
-
MD5
f4c863f065eaa1fdc7124de0d94b4ca2
-
SHA1
b7c701a86dae269ecfa405376080dd2eb4e761b1
-
SHA256
22a6e850b9deb9d6682f795349d23c1f660ba5253028a99a62a43a64f2950fc3
-
SHA512
65847c5bb894ae984592699b0296f99ee071bbe28e368ac00cef5501655b8db0d0a54661e40e63444fde57de9e778a5852bdb24c6f3ede81cb576fbf62695c72
Malware Config
Extracted
Family
systembc
C2
69.49.231.218:4001
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
f4c863f065eaa1fdc7124de0d94b4ca2.exedescription ioc process File created C:\Windows\Tasks\wow64.job f4c863f065eaa1fdc7124de0d94b4ca2.exe File opened for modification C:\Windows\Tasks\wow64.job f4c863f065eaa1fdc7124de0d94b4ca2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1632 wrote to memory of 1676 1632 taskeng.exe f4c863f065eaa1fdc7124de0d94b4ca2.exe PID 1632 wrote to memory of 1676 1632 taskeng.exe f4c863f065eaa1fdc7124de0d94b4ca2.exe PID 1632 wrote to memory of 1676 1632 taskeng.exe f4c863f065eaa1fdc7124de0d94b4ca2.exe PID 1632 wrote to memory of 1676 1632 taskeng.exe f4c863f065eaa1fdc7124de0d94b4ca2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4c863f065eaa1fdc7124de0d94b4ca2.exe"C:\Users\Admin\AppData\Local\Temp\f4c863f065eaa1fdc7124de0d94b4ca2.exe"1⤵
- Drops file in Windows directory
PID:2032
-
C:\Windows\system32\taskeng.exetaskeng.exe {2EDB6CCC-0CDA-4DCC-9DDE-8ECBE5094253} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\f4c863f065eaa1fdc7124de0d94b4ca2.exeC:\Users\Admin\AppData\Local\Temp\f4c863f065eaa1fdc7124de0d94b4ca2.exe start2⤵PID:1676
-