Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
08-02-2022 05:48
Static task
static1
Behavioral task
behavioral1
Sample
550c8e114b13d07fe8fd7cd6e9915267996c6634c1e81f23ff9fe7da2ba74919.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
550c8e114b13d07fe8fd7cd6e9915267996c6634c1e81f23ff9fe7da2ba74919.exe
-
Size
310KB
-
MD5
455dea94a907225687474ee6e3206c0c
-
SHA1
23f0a35eb339aa4d7ed9040082daf13ac1db4959
-
SHA256
550c8e114b13d07fe8fd7cd6e9915267996c6634c1e81f23ff9fe7da2ba74919
-
SHA512
dbe42bcc911441ebd309c3df9340b000f35514d5bb6a5729a379ca770959c227fcc19d2c727dccaea23e47fcd5ee46290c055e249367aef37886f88102076b15
Malware Config
Extracted
Family
systembc
C2
207.32.216.202:4211
192.53.123.202:4211
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
550c8e114b13d07fe8fd7cd6e9915267996c6634c1e81f23ff9fe7da2ba74919.exedescription ioc process File created C:\Windows\Tasks\wow64.job 550c8e114b13d07fe8fd7cd6e9915267996c6634c1e81f23ff9fe7da2ba74919.exe File opened for modification C:\Windows\Tasks\wow64.job 550c8e114b13d07fe8fd7cd6e9915267996c6634c1e81f23ff9fe7da2ba74919.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 652 wrote to memory of 1168 652 taskeng.exe 550c8e114b13d07fe8fd7cd6e9915267996c6634c1e81f23ff9fe7da2ba74919.exe PID 652 wrote to memory of 1168 652 taskeng.exe 550c8e114b13d07fe8fd7cd6e9915267996c6634c1e81f23ff9fe7da2ba74919.exe PID 652 wrote to memory of 1168 652 taskeng.exe 550c8e114b13d07fe8fd7cd6e9915267996c6634c1e81f23ff9fe7da2ba74919.exe PID 652 wrote to memory of 1168 652 taskeng.exe 550c8e114b13d07fe8fd7cd6e9915267996c6634c1e81f23ff9fe7da2ba74919.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\550c8e114b13d07fe8fd7cd6e9915267996c6634c1e81f23ff9fe7da2ba74919.exe"C:\Users\Admin\AppData\Local\Temp\550c8e114b13d07fe8fd7cd6e9915267996c6634c1e81f23ff9fe7da2ba74919.exe"1⤵
- Drops file in Windows directory
PID:1288
-
C:\Windows\system32\taskeng.exetaskeng.exe {3AD42A71-8FB6-4B85-9FB3-EA30733FB53E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\550c8e114b13d07fe8fd7cd6e9915267996c6634c1e81f23ff9fe7da2ba74919.exeC:\Users\Admin\AppData\Local\Temp\550c8e114b13d07fe8fd7cd6e9915267996c6634c1e81f23ff9fe7da2ba74919.exe start2⤵PID:1168
-