Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
13-03-2022 11:30
Static task
static1
General
-
Target
70f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea.exe
-
Size
232KB
-
MD5
f8e7ddc24c5807eefb4c3a1d984c9649
-
SHA1
549870c8f3cc21b13bb78969ce6e8a1717c3255a
-
SHA256
70f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea
-
SHA512
bc5207ad0a9c5602eb401e38d92fbcf51f8fe90dd73ac27e33c1d71ae99b4ef34eb95a29093b5ce2b88377c367d0c189ed1e8a8c0176d7496d61ee940d9b392d
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
jwmcksr.exeogvkxr.exeuhut.exepid process 1536 jwmcksr.exe 4908 ogvkxr.exe 840 uhut.exe -
Drops file in Windows directory 5 IoCs
Processes:
70f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea.exejwmcksr.exeogvkxr.exedescription ioc process File created C:\Windows\Tasks\jwmcksr.job 70f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea.exe File opened for modification C:\Windows\Tasks\jwmcksr.job 70f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea.exe File created C:\Windows\Tasks\otbwurqmligcbvuqpnj.job jwmcksr.exe File created C:\Windows\Tasks\uhut.job ogvkxr.exe File opened for modification C:\Windows\Tasks\uhut.job ogvkxr.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1724 3264 WerFault.exe 70f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
70f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea.exeogvkxr.exepid process 3264 70f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea.exe 3264 70f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea.exe 4908 ogvkxr.exe 4908 ogvkxr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea.exe"C:\Users\Admin\AppData\Local\Temp\70f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3264 -s 9602⤵
- Program crash
PID:1724
-
C:\ProgramData\ohitoql\jwmcksr.exeC:\ProgramData\ohitoql\jwmcksr.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3264 -ip 32641⤵PID:4404
-
C:\Windows\TEMP\ogvkxr.exeC:\Windows\TEMP\ogvkxr.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
C:\ProgramData\iwui\uhut.exeC:\ProgramData\iwui\uhut.exe start1⤵
- Executes dropped EXE
PID:840
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\iwui\uhut.exeMD5
f8e7ddc24c5807eefb4c3a1d984c9649
SHA1549870c8f3cc21b13bb78969ce6e8a1717c3255a
SHA25670f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea
SHA512bc5207ad0a9c5602eb401e38d92fbcf51f8fe90dd73ac27e33c1d71ae99b4ef34eb95a29093b5ce2b88377c367d0c189ed1e8a8c0176d7496d61ee940d9b392d
-
C:\ProgramData\iwui\uhut.exeMD5
f8e7ddc24c5807eefb4c3a1d984c9649
SHA1549870c8f3cc21b13bb78969ce6e8a1717c3255a
SHA25670f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea
SHA512bc5207ad0a9c5602eb401e38d92fbcf51f8fe90dd73ac27e33c1d71ae99b4ef34eb95a29093b5ce2b88377c367d0c189ed1e8a8c0176d7496d61ee940d9b392d
-
C:\ProgramData\ohitoql\jwmcksr.exeMD5
f8e7ddc24c5807eefb4c3a1d984c9649
SHA1549870c8f3cc21b13bb78969ce6e8a1717c3255a
SHA25670f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea
SHA512bc5207ad0a9c5602eb401e38d92fbcf51f8fe90dd73ac27e33c1d71ae99b4ef34eb95a29093b5ce2b88377c367d0c189ed1e8a8c0176d7496d61ee940d9b392d
-
C:\ProgramData\ohitoql\jwmcksr.exeMD5
f8e7ddc24c5807eefb4c3a1d984c9649
SHA1549870c8f3cc21b13bb78969ce6e8a1717c3255a
SHA25670f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea
SHA512bc5207ad0a9c5602eb401e38d92fbcf51f8fe90dd73ac27e33c1d71ae99b4ef34eb95a29093b5ce2b88377c367d0c189ed1e8a8c0176d7496d61ee940d9b392d
-
C:\Windows\TEMP\ogvkxr.exeMD5
f8e7ddc24c5807eefb4c3a1d984c9649
SHA1549870c8f3cc21b13bb78969ce6e8a1717c3255a
SHA25670f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea
SHA512bc5207ad0a9c5602eb401e38d92fbcf51f8fe90dd73ac27e33c1d71ae99b4ef34eb95a29093b5ce2b88377c367d0c189ed1e8a8c0176d7496d61ee940d9b392d
-
C:\Windows\Tasks\jwmcksr.jobMD5
0976e3dcf1696f2eb2f6d71db17ab629
SHA1329076b33c7dd5e6fd3b822e82ca93812b78373a
SHA2567f3ad8ff4ce91bb16fa8066486afa2a552c6a3c2f69b29e7eb86284383a30e9a
SHA51291d54f72aa8f8f7db688bba35e6a34bc8dd5b3cf0a18ae5712f4f82ff861cb9dedfb8246129f8f0f5fe62d883b3bc414066d729b3a4bc7c461b849d77af8b922
-
C:\Windows\Temp\ogvkxr.exeMD5
f8e7ddc24c5807eefb4c3a1d984c9649
SHA1549870c8f3cc21b13bb78969ce6e8a1717c3255a
SHA25670f95be0a7035dd24ec29d91f3bf9db0d184760725f4742d2560e59d048221ea
SHA512bc5207ad0a9c5602eb401e38d92fbcf51f8fe90dd73ac27e33c1d71ae99b4ef34eb95a29093b5ce2b88377c367d0c189ed1e8a8c0176d7496d61ee940d9b392d
-
memory/840-149-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/840-148-0x00000000005CD000-0x00000000005D6000-memory.dmpFilesize
36KB
-
memory/840-147-0x00000000005CD000-0x00000000005D6000-memory.dmpFilesize
36KB
-
memory/1536-138-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/1536-137-0x000000000069D000-0x00000000006A6000-memory.dmpFilesize
36KB
-
memory/1536-136-0x000000000069D000-0x00000000006A6000-memory.dmpFilesize
36KB
-
memory/3264-133-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/3264-132-0x0000000000600000-0x0000000000609000-memory.dmpFilesize
36KB
-
memory/3264-131-0x0000000000641000-0x000000000064A000-memory.dmpFilesize
36KB
-
memory/3264-130-0x0000000000641000-0x000000000064A000-memory.dmpFilesize
36KB
-
memory/4908-141-0x000000000055D000-0x0000000000566000-memory.dmpFilesize
36KB
-
memory/4908-143-0x000000000055D000-0x0000000000566000-memory.dmpFilesize
36KB
-
memory/4908-144-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB