Analysis
-
max time kernel
4294178s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
10-03-2022 23:24
Static task
static1
Behavioral task
behavioral1
Sample
module_e5_538_ae3f6af06a02781e995650761b3a82c6.exe
Resource
win7-20220223-en
windows7_x64
0 signatures
0 seconds
General
-
Target
module_e5_538_ae3f6af06a02781e995650761b3a82c6.exe
-
Size
1.4MB
-
MD5
ae3f6af06a02781e995650761b3a82c6
-
SHA1
ded2009c9a5645c7582b4d1e9bc2e7133689a774
-
SHA256
c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5
-
SHA512
31c1009b7b658645b3371c8a7ee6e6953a50b42e529ee69365742b0f7deea1fcc90adf90e6b1522fff998a232a6abef8139003698da0b15856923ad202e4602f
Malware Config
Extracted
Family
systembc
C2
96.30.196.207:4177
45.32.132.182:4177
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
module_e5_538_ae3f6af06a02781e995650761b3a82c6.exedescription ioc Process File created C:\Windows\Tasks\wow64.job module_e5_538_ae3f6af06a02781e995650761b3a82c6.exe File opened for modification C:\Windows\Tasks\wow64.job module_e5_538_ae3f6af06a02781e995650761b3a82c6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid Process procid_target PID 960 wrote to memory of 584 960 taskeng.exe 28 PID 960 wrote to memory of 584 960 taskeng.exe 28 PID 960 wrote to memory of 584 960 taskeng.exe 28 PID 960 wrote to memory of 584 960 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\module_e5_538_ae3f6af06a02781e995650761b3a82c6.exe"C:\Users\Admin\AppData\Local\Temp\module_e5_538_ae3f6af06a02781e995650761b3a82c6.exe"1⤵
- Drops file in Windows directory
PID:956
-
C:\Windows\system32\taskeng.exetaskeng.exe {F3F7F8A9-2B90-4CAE-8A4F-B5F00CFBBEC5} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\module_e5_538_ae3f6af06a02781e995650761b3a82c6.exeC:\Users\Admin\AppData\Local\Temp\module_e5_538_ae3f6af06a02781e995650761b3a82c6.exe start2⤵PID:584
-