Analysis
-
max time kernel
170s -
max time network
214s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 08:40
Static task
static1
Behavioral task
behavioral1
Sample
32e51accf5a30da12e43b3c7f83867577fcd6fb363d7773a743ab1bbb9653d06.exe
Resource
win7-en-20211208
General
-
Target
32e51accf5a30da12e43b3c7f83867577fcd6fb363d7773a743ab1bbb9653d06.exe
-
Size
423KB
-
MD5
ab52b38a4f5393e5bf919b75c0abdbdf
-
SHA1
1fe162d6461405f7bd2c8def91e547cf85b28638
-
SHA256
32e51accf5a30da12e43b3c7f83867577fcd6fb363d7773a743ab1bbb9653d06
-
SHA512
c7cbf5bbba6c6b4e5069ea0f5b6343e771cfd86f6a1295d7b9b653465f3068ac0a5c9492a89f38ac81db92879642dbab8943507a72438223690bacb291d8cdbc
Malware Config
Extracted
systembc
88.119.174.113:443
Signatures
-
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral1/memory/1680-60-0x0000000000240000-0x000000000024B000-memory.dmp dave -
Executes dropped EXE 1 IoCs
Processes:
dqtuh.exepid process 924 dqtuh.exe -
Drops file in Windows directory 2 IoCs
Processes:
32e51accf5a30da12e43b3c7f83867577fcd6fb363d7773a743ab1bbb9653d06.exedescription ioc process File created C:\Windows\Tasks\dqtuh.job 32e51accf5a30da12e43b3c7f83867577fcd6fb363d7773a743ab1bbb9653d06.exe File opened for modification C:\Windows\Tasks\dqtuh.job 32e51accf5a30da12e43b3c7f83867577fcd6fb363d7773a743ab1bbb9653d06.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
32e51accf5a30da12e43b3c7f83867577fcd6fb363d7773a743ab1bbb9653d06.exepid process 1680 32e51accf5a30da12e43b3c7f83867577fcd6fb363d7773a743ab1bbb9653d06.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1368 wrote to memory of 924 1368 taskeng.exe dqtuh.exe PID 1368 wrote to memory of 924 1368 taskeng.exe dqtuh.exe PID 1368 wrote to memory of 924 1368 taskeng.exe dqtuh.exe PID 1368 wrote to memory of 924 1368 taskeng.exe dqtuh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32e51accf5a30da12e43b3c7f83867577fcd6fb363d7773a743ab1bbb9653d06.exe"C:\Users\Admin\AppData\Local\Temp\32e51accf5a30da12e43b3c7f83867577fcd6fb363d7773a743ab1bbb9653d06.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
C:\Windows\system32\taskeng.exetaskeng.exe {5A81067A-4184-45E0-A961-66EBEC18B451} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\ProgramData\hjradlt\dqtuh.exeC:\ProgramData\hjradlt\dqtuh.exe start2⤵
- Executes dropped EXE
PID:924
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\hjradlt\dqtuh.exeMD5
ab52b38a4f5393e5bf919b75c0abdbdf
SHA11fe162d6461405f7bd2c8def91e547cf85b28638
SHA25632e51accf5a30da12e43b3c7f83867577fcd6fb363d7773a743ab1bbb9653d06
SHA512c7cbf5bbba6c6b4e5069ea0f5b6343e771cfd86f6a1295d7b9b653465f3068ac0a5c9492a89f38ac81db92879642dbab8943507a72438223690bacb291d8cdbc
-
C:\ProgramData\hjradlt\dqtuh.exeMD5
ab52b38a4f5393e5bf919b75c0abdbdf
SHA11fe162d6461405f7bd2c8def91e547cf85b28638
SHA25632e51accf5a30da12e43b3c7f83867577fcd6fb363d7773a743ab1bbb9653d06
SHA512c7cbf5bbba6c6b4e5069ea0f5b6343e771cfd86f6a1295d7b9b653465f3068ac0a5c9492a89f38ac81db92879642dbab8943507a72438223690bacb291d8cdbc
-
memory/924-64-0x00000000001F0000-0x00000000001FE000-memory.dmpFilesize
56KB
-
memory/924-67-0x00000000003C0000-0x00000000003CB000-memory.dmpFilesize
44KB
-
memory/1680-54-0x0000000000290000-0x000000000029E000-memory.dmpFilesize
56KB
-
memory/1680-57-0x0000000076421000-0x0000000076423000-memory.dmpFilesize
8KB
-
memory/1680-58-0x0000000000320000-0x000000000032B000-memory.dmpFilesize
44KB
-
memory/1680-60-0x0000000000240000-0x000000000024B000-memory.dmpFilesize
44KB