Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10_x64 -
resource
win10-20220223-en -
submitted
13-03-2022 06:40
Static task
static1
General
-
Target
f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c.exe
-
Size
231KB
-
MD5
b4f198027150f53a087ef4b179de0794
-
SHA1
d3622afda0f3ed03e82e13a844b4ad0df595713e
-
SHA256
f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c
-
SHA512
df3c8ad2cf23b01b03e3e9d85360eb1824670621ab09f69db35e0cbc5734ae04154ac413141723825c1bc6adcee2ec881c0311125b0ec55496fb222fcffb1384
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
acamlg.exeqbtm.exejlgs.exepid process 3928 acamlg.exe 972 qbtm.exe 3688 jlgs.exe -
Drops file in Windows directory 5 IoCs
Processes:
f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c.exeacamlg.exeqbtm.exedescription ioc process File created C:\Windows\Tasks\acamlg.job f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c.exe File opened for modification C:\Windows\Tasks\acamlg.job f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c.exe File created C:\Windows\Tasks\fqeunfwphaqjbskdtme.job acamlg.exe File created C:\Windows\Tasks\jlgs.job qbtm.exe File opened for modification C:\Windows\Tasks\jlgs.job qbtm.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c.exeqbtm.exepid process 2372 f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c.exe 2372 f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c.exe 972 qbtm.exe 972 qbtm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c.exe"C:\Users\Admin\AppData\Local\Temp\f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
C:\ProgramData\vdripf\acamlg.exeC:\ProgramData\vdripf\acamlg.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3928
-
C:\Windows\TEMP\qbtm.exeC:\Windows\TEMP\qbtm.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:972
-
C:\ProgramData\akgw\jlgs.exeC:\ProgramData\akgw\jlgs.exe start1⤵
- Executes dropped EXE
PID:3688
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\akgw\jlgs.exeMD5
b4f198027150f53a087ef4b179de0794
SHA1d3622afda0f3ed03e82e13a844b4ad0df595713e
SHA256f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c
SHA512df3c8ad2cf23b01b03e3e9d85360eb1824670621ab09f69db35e0cbc5734ae04154ac413141723825c1bc6adcee2ec881c0311125b0ec55496fb222fcffb1384
-
C:\ProgramData\akgw\jlgs.exeMD5
b4f198027150f53a087ef4b179de0794
SHA1d3622afda0f3ed03e82e13a844b4ad0df595713e
SHA256f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c
SHA512df3c8ad2cf23b01b03e3e9d85360eb1824670621ab09f69db35e0cbc5734ae04154ac413141723825c1bc6adcee2ec881c0311125b0ec55496fb222fcffb1384
-
C:\ProgramData\vdripf\acamlg.exeMD5
b4f198027150f53a087ef4b179de0794
SHA1d3622afda0f3ed03e82e13a844b4ad0df595713e
SHA256f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c
SHA512df3c8ad2cf23b01b03e3e9d85360eb1824670621ab09f69db35e0cbc5734ae04154ac413141723825c1bc6adcee2ec881c0311125b0ec55496fb222fcffb1384
-
C:\ProgramData\vdripf\acamlg.exeMD5
b4f198027150f53a087ef4b179de0794
SHA1d3622afda0f3ed03e82e13a844b4ad0df595713e
SHA256f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c
SHA512df3c8ad2cf23b01b03e3e9d85360eb1824670621ab09f69db35e0cbc5734ae04154ac413141723825c1bc6adcee2ec881c0311125b0ec55496fb222fcffb1384
-
C:\Windows\TEMP\qbtm.exeMD5
b4f198027150f53a087ef4b179de0794
SHA1d3622afda0f3ed03e82e13a844b4ad0df595713e
SHA256f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c
SHA512df3c8ad2cf23b01b03e3e9d85360eb1824670621ab09f69db35e0cbc5734ae04154ac413141723825c1bc6adcee2ec881c0311125b0ec55496fb222fcffb1384
-
C:\Windows\Tasks\acamlg.jobMD5
5735493dc4aae1ccfd5357b9659eb4f0
SHA1018b731452c4cd99b053ba1fea66fd259d1ec026
SHA25668313f39b3e7f32b3ccd6abd51cd80d94f46b910ff271580848e4c5d1913dcdf
SHA512eae461c0b82ebfac7ebc075acbf33b3f0307fa347a2c20948a5b63a19f7f0c6a18377ef64e183cdb828af679d32939d6670b8997e243d819fad347a2003ebb22
-
C:\Windows\Temp\qbtm.exeMD5
b4f198027150f53a087ef4b179de0794
SHA1d3622afda0f3ed03e82e13a844b4ad0df595713e
SHA256f9a9f80396a55b00101bc149f0cfd8285c458edff663918ab8fca4276cc11d5c
SHA512df3c8ad2cf23b01b03e3e9d85360eb1824670621ab09f69db35e0cbc5734ae04154ac413141723825c1bc6adcee2ec881c0311125b0ec55496fb222fcffb1384
-
memory/972-128-0x0000000000470000-0x00000000005BA000-memory.dmpFilesize
1.3MB
-
memory/972-130-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/972-129-0x00000000001E0000-0x00000000001E9000-memory.dmpFilesize
36KB
-
memory/2372-116-0x00000000004D0000-0x000000000061A000-memory.dmpFilesize
1.3MB
-
memory/2372-115-0x00000000004D0000-0x000000000061A000-memory.dmpFilesize
1.3MB
-
memory/2372-117-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/3688-133-0x00000000007B2000-0x00000000007BB000-memory.dmpFilesize
36KB
-
memory/3688-134-0x00000000007B2000-0x00000000007BB000-memory.dmpFilesize
36KB
-
memory/3688-135-0x0000000000470000-0x00000000005BA000-memory.dmpFilesize
1.3MB
-
memory/3688-136-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/3928-121-0x00000000004D0000-0x000000000057E000-memory.dmpFilesize
696KB
-
memory/3928-123-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/3928-122-0x00000000004D0000-0x000000000057E000-memory.dmpFilesize
696KB