Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
13-03-2022 15:50
Static task
static1
General
-
Target
dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8.exe
-
Size
232KB
-
MD5
14b1292f0bb166062b889b5ea588d593
-
SHA1
66522b2905ca9d04a9f3531bb1b73a7e0763de59
-
SHA256
dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8
-
SHA512
0677383a45970bd7189e8158ffda4d1fd3076b61e5566efb46ba108bf1b5317d449f93d149ad09b28e4ee08ec90678fbcfc2dbcb8bc09a2ef4bbd866e31d595b
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
ddcj.exeoujxn.exeuttinr.exepid process 2344 ddcj.exe 4840 oujxn.exe 4280 uttinr.exe -
Drops file in Windows directory 5 IoCs
Processes:
dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8.exeddcj.exeoujxn.exedescription ioc process File created C:\Windows\Tasks\ddcj.job dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8.exe File opened for modification C:\Windows\Tasks\ddcj.job dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8.exe File created C:\Windows\Tasks\uhphtiujvkwlxmanboc.job ddcj.exe File created C:\Windows\Tasks\uttinr.job oujxn.exe File opened for modification C:\Windows\Tasks\uttinr.job oujxn.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 260 3428 WerFault.exe dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8.exeoujxn.exepid process 3428 dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8.exe 3428 dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8.exe 4840 oujxn.exe 4840 oujxn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8.exe"C:\Users\Admin\AppData\Local\Temp\dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 4922⤵
- Program crash
PID:260
-
C:\ProgramData\kghjbia\ddcj.exeC:\ProgramData\kghjbia\ddcj.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3428 -ip 34281⤵PID:4944
-
C:\Windows\TEMP\oujxn.exeC:\Windows\TEMP\oujxn.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
C:\ProgramData\kjopuwc\uttinr.exeC:\ProgramData\kjopuwc\uttinr.exe start1⤵
- Executes dropped EXE
PID:4280
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\kghjbia\ddcj.exeMD5
14b1292f0bb166062b889b5ea588d593
SHA166522b2905ca9d04a9f3531bb1b73a7e0763de59
SHA256dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8
SHA5120677383a45970bd7189e8158ffda4d1fd3076b61e5566efb46ba108bf1b5317d449f93d149ad09b28e4ee08ec90678fbcfc2dbcb8bc09a2ef4bbd866e31d595b
-
C:\ProgramData\kghjbia\ddcj.exeMD5
14b1292f0bb166062b889b5ea588d593
SHA166522b2905ca9d04a9f3531bb1b73a7e0763de59
SHA256dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8
SHA5120677383a45970bd7189e8158ffda4d1fd3076b61e5566efb46ba108bf1b5317d449f93d149ad09b28e4ee08ec90678fbcfc2dbcb8bc09a2ef4bbd866e31d595b
-
C:\ProgramData\kjopuwc\uttinr.exeMD5
14b1292f0bb166062b889b5ea588d593
SHA166522b2905ca9d04a9f3531bb1b73a7e0763de59
SHA256dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8
SHA5120677383a45970bd7189e8158ffda4d1fd3076b61e5566efb46ba108bf1b5317d449f93d149ad09b28e4ee08ec90678fbcfc2dbcb8bc09a2ef4bbd866e31d595b
-
C:\ProgramData\kjopuwc\uttinr.exeMD5
14b1292f0bb166062b889b5ea588d593
SHA166522b2905ca9d04a9f3531bb1b73a7e0763de59
SHA256dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8
SHA5120677383a45970bd7189e8158ffda4d1fd3076b61e5566efb46ba108bf1b5317d449f93d149ad09b28e4ee08ec90678fbcfc2dbcb8bc09a2ef4bbd866e31d595b
-
C:\Windows\TEMP\oujxn.exeMD5
14b1292f0bb166062b889b5ea588d593
SHA166522b2905ca9d04a9f3531bb1b73a7e0763de59
SHA256dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8
SHA5120677383a45970bd7189e8158ffda4d1fd3076b61e5566efb46ba108bf1b5317d449f93d149ad09b28e4ee08ec90678fbcfc2dbcb8bc09a2ef4bbd866e31d595b
-
C:\Windows\Tasks\ddcj.jobMD5
791eec16b44f1fddcbacd29d5b9d88c5
SHA12554ae734afb0d4f2523f1921ccd66a692e36d35
SHA256aa94f2e0b6be8c5b43cc65ee3c646f55d6e61a630b4fcd5fe6c773577d32d46c
SHA51282ddf64d4440d433a8ea92b6c484558e77120b85aae11f29f5e5dfeb23a6415d845225cf9277a8dfff5897ceec3bd7e54bd9528a9a74936cf54a79ab92835a68
-
C:\Windows\Temp\oujxn.exeMD5
14b1292f0bb166062b889b5ea588d593
SHA166522b2905ca9d04a9f3531bb1b73a7e0763de59
SHA256dbf1a40d9c78fde45c5c1f1648af8b3592e3ef4fea2f5c086b196d3784fdc3c8
SHA5120677383a45970bd7189e8158ffda4d1fd3076b61e5566efb46ba108bf1b5317d449f93d149ad09b28e4ee08ec90678fbcfc2dbcb8bc09a2ef4bbd866e31d595b
-
memory/2344-136-0x000000000077D000-0x0000000000786000-memory.dmpFilesize
36KB
-
memory/2344-137-0x000000000077D000-0x0000000000786000-memory.dmpFilesize
36KB
-
memory/2344-138-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/3428-130-0x0000000000621000-0x000000000062A000-memory.dmpFilesize
36KB
-
memory/3428-131-0x0000000000621000-0x000000000062A000-memory.dmpFilesize
36KB
-
memory/3428-133-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/3428-132-0x00000000021A0000-0x00000000021A9000-memory.dmpFilesize
36KB
-
memory/4280-147-0x00000000006AD000-0x00000000006B6000-memory.dmpFilesize
36KB
-
memory/4280-148-0x00000000006AD000-0x00000000006B6000-memory.dmpFilesize
36KB
-
memory/4280-149-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/4840-141-0x000000000064D000-0x0000000000656000-memory.dmpFilesize
36KB
-
memory/4840-143-0x000000000064D000-0x0000000000656000-memory.dmpFilesize
36KB
-
memory/4840-144-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB