Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10_x64 -
resource
win10-20220223-en -
submitted
13-03-2022 19:10
Static task
static1
General
-
Target
26babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073.exe
-
Size
233KB
-
MD5
46b2756fe95bbb5020b18f97392e2132
-
SHA1
2ea2c500bde740012c5f7623107edff40ae9c60f
-
SHA256
26babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073
-
SHA512
4bdf30aa2160707160ef30f1c9449ff7fd0d489b21d46812f2a3982d728364db48e9809ca31986f54d7add6b560c9447ad6d6c6dbaba0d4a1b65859b8827cacc
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
fmdkgd.exeqhbt.exejaxv.exepid process 2324 fmdkgd.exe 3948 qhbt.exe 3968 jaxv.exe -
Drops file in Windows directory 5 IoCs
Processes:
26babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073.exefmdkgd.exeqhbt.exedescription ioc process File created C:\Windows\Tasks\fmdkgd.job 26babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073.exe File opened for modification C:\Windows\Tasks\fmdkgd.job 26babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073.exe File created C:\Windows\Tasks\tgcbglmlwhisseeeoaa.job fmdkgd.exe File created C:\Windows\Tasks\jaxv.job qhbt.exe File opened for modification C:\Windows\Tasks\jaxv.job qhbt.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
26babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073.exeqhbt.exepid process 3596 26babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073.exe 3596 26babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073.exe 3948 qhbt.exe 3948 qhbt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\26babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073.exe"C:\Users\Admin\AppData\Local\Temp\26babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
C:\ProgramData\lfmn\fmdkgd.exeC:\ProgramData\lfmn\fmdkgd.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2324
-
C:\Windows\TEMP\qhbt.exeC:\Windows\TEMP\qhbt.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
C:\ProgramData\ntehvb\jaxv.exeC:\ProgramData\ntehvb\jaxv.exe start1⤵
- Executes dropped EXE
PID:3968
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
46b2756fe95bbb5020b18f97392e2132
SHA12ea2c500bde740012c5f7623107edff40ae9c60f
SHA25626babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073
SHA5124bdf30aa2160707160ef30f1c9449ff7fd0d489b21d46812f2a3982d728364db48e9809ca31986f54d7add6b560c9447ad6d6c6dbaba0d4a1b65859b8827cacc
-
MD5
46b2756fe95bbb5020b18f97392e2132
SHA12ea2c500bde740012c5f7623107edff40ae9c60f
SHA25626babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073
SHA5124bdf30aa2160707160ef30f1c9449ff7fd0d489b21d46812f2a3982d728364db48e9809ca31986f54d7add6b560c9447ad6d6c6dbaba0d4a1b65859b8827cacc
-
MD5
46b2756fe95bbb5020b18f97392e2132
SHA12ea2c500bde740012c5f7623107edff40ae9c60f
SHA25626babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073
SHA5124bdf30aa2160707160ef30f1c9449ff7fd0d489b21d46812f2a3982d728364db48e9809ca31986f54d7add6b560c9447ad6d6c6dbaba0d4a1b65859b8827cacc
-
MD5
46b2756fe95bbb5020b18f97392e2132
SHA12ea2c500bde740012c5f7623107edff40ae9c60f
SHA25626babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073
SHA5124bdf30aa2160707160ef30f1c9449ff7fd0d489b21d46812f2a3982d728364db48e9809ca31986f54d7add6b560c9447ad6d6c6dbaba0d4a1b65859b8827cacc
-
MD5
46b2756fe95bbb5020b18f97392e2132
SHA12ea2c500bde740012c5f7623107edff40ae9c60f
SHA25626babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073
SHA5124bdf30aa2160707160ef30f1c9449ff7fd0d489b21d46812f2a3982d728364db48e9809ca31986f54d7add6b560c9447ad6d6c6dbaba0d4a1b65859b8827cacc
-
MD5
5dadf141e449e8e7443d6575ca8497ce
SHA19ab15a3c005aaa8f90c12890c6ce313782935427
SHA25635a5d2263289cc213b65eb7faf4c6a11d5f1156949ecb12a11e29eef2a4cdb65
SHA512323e9aae142a1eddda6df7164c895382702ccf8eaac95691aaab5a7cecaea289e2b6dbda6b9e35217dc4ef80de1d309d367a89715a5d5209e0725ccbcff371c2
-
MD5
46b2756fe95bbb5020b18f97392e2132
SHA12ea2c500bde740012c5f7623107edff40ae9c60f
SHA25626babc0a6d078f137e389a7ea1c4a8a7110c495c053269d52a7936469df06073
SHA5124bdf30aa2160707160ef30f1c9449ff7fd0d489b21d46812f2a3982d728364db48e9809ca31986f54d7add6b560c9447ad6d6c6dbaba0d4a1b65859b8827cacc