Analysis
-
max time kernel
117s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 17:27
Static task
static1
Behavioral task
behavioral1
Sample
3d44aa7a97608eb72bb53fc9c679e21381867f6e5a2a3.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
3d44aa7a97608eb72bb53fc9c679e21381867f6e5a2a3.exe
-
Size
344KB
-
MD5
0c8e60e686bed8b0debc760b085f89a7
-
SHA1
60eae9962d92223a448f978004972f4be2f10588
-
SHA256
3d44aa7a97608eb72bb53fc9c679e21381867f6e5a2a370689dc516c2418a58e
-
SHA512
e0be1a48c2715c820306ca43443f010ab65589525e35755e42df8291dfad083cb2f6f8204f44c4248269221212eaf8f73fdf1c44f24be217d40e42a0b62648f3
Malware Config
Extracted
Family
systembc
C2
107.155.124.13:4001
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
3d44aa7a97608eb72bb53fc9c679e21381867f6e5a2a3.exedescription ioc process File created C:\Windows\Tasks\wow64.job 3d44aa7a97608eb72bb53fc9c679e21381867f6e5a2a3.exe File opened for modification C:\Windows\Tasks\wow64.job 3d44aa7a97608eb72bb53fc9c679e21381867f6e5a2a3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1928 wrote to memory of 660 1928 taskeng.exe 3d44aa7a97608eb72bb53fc9c679e21381867f6e5a2a3.exe PID 1928 wrote to memory of 660 1928 taskeng.exe 3d44aa7a97608eb72bb53fc9c679e21381867f6e5a2a3.exe PID 1928 wrote to memory of 660 1928 taskeng.exe 3d44aa7a97608eb72bb53fc9c679e21381867f6e5a2a3.exe PID 1928 wrote to memory of 660 1928 taskeng.exe 3d44aa7a97608eb72bb53fc9c679e21381867f6e5a2a3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d44aa7a97608eb72bb53fc9c679e21381867f6e5a2a3.exe"C:\Users\Admin\AppData\Local\Temp\3d44aa7a97608eb72bb53fc9c679e21381867f6e5a2a3.exe"1⤵
- Drops file in Windows directory
PID:1844
-
C:\Windows\system32\taskeng.exetaskeng.exe {5A1461A0-2219-4DA9-8AAA-694BF904D5CB} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\3d44aa7a97608eb72bb53fc9c679e21381867f6e5a2a3.exeC:\Users\Admin\AppData\Local\Temp\3d44aa7a97608eb72bb53fc9c679e21381867f6e5a2a3.exe start2⤵PID:660
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/660-58-0x000000000026B000-0x000000000027C000-memory.dmpFilesize
68KB
-
memory/660-60-0x000000000026B000-0x000000000027C000-memory.dmpFilesize
68KB
-
memory/660-61-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/1844-53-0x000000000028B000-0x000000000029C000-memory.dmpFilesize
68KB
-
memory/1844-54-0x0000000075341000-0x0000000075343000-memory.dmpFilesize
8KB
-
memory/1844-56-0x00000000001C0000-0x00000000001C5000-memory.dmpFilesize
20KB
-
memory/1844-55-0x000000000028B000-0x000000000029C000-memory.dmpFilesize
68KB
-
memory/1844-57-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB