Analysis
-
max time kernel
112s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
14-03-2022 02:10
Static task
static1
General
-
Target
ae487bcbd066a3bca802abb7b65f69691a0ffa850aa24ef0441a18243bbda46a.exe
-
Size
232KB
-
MD5
d4bf806a2cd1f84ccdcff2184c93dc90
-
SHA1
1c110e247459619b11e316ab8a119136be8cd337
-
SHA256
ae487bcbd066a3bca802abb7b65f69691a0ffa850aa24ef0441a18243bbda46a
-
SHA512
0e73dee591753e84e08f290833b5bd39ba60be355e362477fb811e29c7e1c81da6566f00f17a3c6bea179284960360fda21075152a328a2925643214bd0ec124
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
hmwhr.exepid process 684 hmwhr.exe -
Drops file in Windows directory 3 IoCs
Processes:
ae487bcbd066a3bca802abb7b65f69691a0ffa850aa24ef0441a18243bbda46a.exehmwhr.exedescription ioc process File created C:\Windows\Tasks\hmwhr.job ae487bcbd066a3bca802abb7b65f69691a0ffa850aa24ef0441a18243bbda46a.exe File opened for modification C:\Windows\Tasks\hmwhr.job ae487bcbd066a3bca802abb7b65f69691a0ffa850aa24ef0441a18243bbda46a.exe File created C:\Windows\Tasks\luugtehhdndxtjtplbl.job hmwhr.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1512 3468 WerFault.exe ae487bcbd066a3bca802abb7b65f69691a0ffa850aa24ef0441a18243bbda46a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ae487bcbd066a3bca802abb7b65f69691a0ffa850aa24ef0441a18243bbda46a.exepid process 3468 ae487bcbd066a3bca802abb7b65f69691a0ffa850aa24ef0441a18243bbda46a.exe 3468 ae487bcbd066a3bca802abb7b65f69691a0ffa850aa24ef0441a18243bbda46a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae487bcbd066a3bca802abb7b65f69691a0ffa850aa24ef0441a18243bbda46a.exe"C:\Users\Admin\AppData\Local\Temp\ae487bcbd066a3bca802abb7b65f69691a0ffa850aa24ef0441a18243bbda46a.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 4842⤵
- Program crash
PID:1512
-
-
C:\ProgramData\bwcw\hmwhr.exeC:\ProgramData\bwcw\hmwhr.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3468 -ip 34681⤵PID:2208
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d4bf806a2cd1f84ccdcff2184c93dc90
SHA11c110e247459619b11e316ab8a119136be8cd337
SHA256ae487bcbd066a3bca802abb7b65f69691a0ffa850aa24ef0441a18243bbda46a
SHA5120e73dee591753e84e08f290833b5bd39ba60be355e362477fb811e29c7e1c81da6566f00f17a3c6bea179284960360fda21075152a328a2925643214bd0ec124
-
MD5
d4bf806a2cd1f84ccdcff2184c93dc90
SHA11c110e247459619b11e316ab8a119136be8cd337
SHA256ae487bcbd066a3bca802abb7b65f69691a0ffa850aa24ef0441a18243bbda46a
SHA5120e73dee591753e84e08f290833b5bd39ba60be355e362477fb811e29c7e1c81da6566f00f17a3c6bea179284960360fda21075152a328a2925643214bd0ec124