Analysis
-
max time kernel
129s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
13-03-2022 00:50
Static task
static1
General
-
Target
ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa.exe
-
Size
232KB
-
MD5
ac6bf90306045544b1a7ff716e8b8e3c
-
SHA1
65f56045aae93ab3c0e60d9f57fb8d2ca4e51476
-
SHA256
ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa
-
SHA512
2d19d20e7f7e710cdc749caa89860e12e1fe48c53b3e04d102be6741c0c8de19db3581516c2c6cb192ba72817b6f680c6072dc1d29ea61b22dc8522306e80ba5
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
jlqb.exeeofaq.exextef.exepid process 4188 jlqb.exe 3332 eofaq.exe 2292 xtef.exe -
Drops file in Windows directory 5 IoCs
Processes:
ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa.exejlqb.exeeofaq.exedescription ioc process File created C:\Windows\Tasks\jlqb.job ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa.exe File opened for modification C:\Windows\Tasks\jlqb.job ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa.exe File created C:\Windows\Tasks\urfsrlodgtwlkdgtwlo.job jlqb.exe File created C:\Windows\Tasks\xtef.job eofaq.exe File opened for modification C:\Windows\Tasks\xtef.job eofaq.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3084 3056 WerFault.exe ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa.exeeofaq.exepid process 3056 ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa.exe 3056 ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa.exe 3332 eofaq.exe 3332 eofaq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa.exe"C:\Users\Admin\AppData\Local\Temp\ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 4842⤵
- Program crash
PID:3084
-
C:\ProgramData\mgbmam\jlqb.exeC:\ProgramData\mgbmam\jlqb.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3056 -ip 30561⤵PID:2692
-
C:\Windows\TEMP\eofaq.exeC:\Windows\TEMP\eofaq.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
C:\ProgramData\onebrt\xtef.exeC:\ProgramData\onebrt\xtef.exe start1⤵
- Executes dropped EXE
PID:2292
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\mgbmam\jlqb.exeMD5
ac6bf90306045544b1a7ff716e8b8e3c
SHA165f56045aae93ab3c0e60d9f57fb8d2ca4e51476
SHA256ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa
SHA5122d19d20e7f7e710cdc749caa89860e12e1fe48c53b3e04d102be6741c0c8de19db3581516c2c6cb192ba72817b6f680c6072dc1d29ea61b22dc8522306e80ba5
-
C:\ProgramData\mgbmam\jlqb.exeMD5
ac6bf90306045544b1a7ff716e8b8e3c
SHA165f56045aae93ab3c0e60d9f57fb8d2ca4e51476
SHA256ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa
SHA5122d19d20e7f7e710cdc749caa89860e12e1fe48c53b3e04d102be6741c0c8de19db3581516c2c6cb192ba72817b6f680c6072dc1d29ea61b22dc8522306e80ba5
-
C:\ProgramData\onebrt\xtef.exeMD5
ac6bf90306045544b1a7ff716e8b8e3c
SHA165f56045aae93ab3c0e60d9f57fb8d2ca4e51476
SHA256ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa
SHA5122d19d20e7f7e710cdc749caa89860e12e1fe48c53b3e04d102be6741c0c8de19db3581516c2c6cb192ba72817b6f680c6072dc1d29ea61b22dc8522306e80ba5
-
C:\ProgramData\onebrt\xtef.exeMD5
ac6bf90306045544b1a7ff716e8b8e3c
SHA165f56045aae93ab3c0e60d9f57fb8d2ca4e51476
SHA256ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa
SHA5122d19d20e7f7e710cdc749caa89860e12e1fe48c53b3e04d102be6741c0c8de19db3581516c2c6cb192ba72817b6f680c6072dc1d29ea61b22dc8522306e80ba5
-
C:\Windows\TEMP\eofaq.exeMD5
ac6bf90306045544b1a7ff716e8b8e3c
SHA165f56045aae93ab3c0e60d9f57fb8d2ca4e51476
SHA256ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa
SHA5122d19d20e7f7e710cdc749caa89860e12e1fe48c53b3e04d102be6741c0c8de19db3581516c2c6cb192ba72817b6f680c6072dc1d29ea61b22dc8522306e80ba5
-
C:\Windows\Tasks\jlqb.jobMD5
8b1621e9d718b6c968e27889dc123c30
SHA14820bbf38cb99534e61abd4aef890c83b8c7bcfa
SHA25644f3026bc964f4687b55fdc8280a986ac06d7569fd058d1e22ef7c1d84e9ec47
SHA51295fc416d0332456a42b37d0efeb75e35dc5f092e585ac31451722be8704947ea1b12e05dc38d717843824fc15f9fb15bee8967e39d54448421a941785416d5a7
-
C:\Windows\Temp\eofaq.exeMD5
ac6bf90306045544b1a7ff716e8b8e3c
SHA165f56045aae93ab3c0e60d9f57fb8d2ca4e51476
SHA256ba520856ae086161d5125754b5d052f1ecdcb71f628691e4d957111f2adc8cfa
SHA5122d19d20e7f7e710cdc749caa89860e12e1fe48c53b3e04d102be6741c0c8de19db3581516c2c6cb192ba72817b6f680c6072dc1d29ea61b22dc8522306e80ba5
-
memory/2292-149-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/2292-148-0x0000000000495000-0x000000000049E000-memory.dmpFilesize
36KB
-
memory/2292-147-0x0000000000495000-0x000000000049E000-memory.dmpFilesize
36KB
-
memory/3056-130-0x0000000000509000-0x0000000000512000-memory.dmpFilesize
36KB
-
memory/3056-132-0x0000000000620000-0x0000000000629000-memory.dmpFilesize
36KB
-
memory/3056-131-0x0000000000509000-0x0000000000512000-memory.dmpFilesize
36KB
-
memory/3056-133-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/3332-141-0x0000000000675000-0x000000000067E000-memory.dmpFilesize
36KB
-
memory/3332-144-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/3332-143-0x0000000000675000-0x000000000067E000-memory.dmpFilesize
36KB
-
memory/4188-138-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/4188-137-0x0000000000715000-0x000000000071E000-memory.dmpFilesize
36KB
-
memory/4188-136-0x0000000000715000-0x000000000071E000-memory.dmpFilesize
36KB