Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
14-03-2022 08:10
Static task
static1
General
-
Target
f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f.exe
-
Size
236KB
-
MD5
4417e4db8f9d2e891432de2af78b29ac
-
SHA1
dc9f0732d9681a1fbe545d4df05536b5eaba2461
-
SHA256
f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f
-
SHA512
1da861d7f14948158614798a4d1a2372e668ab53d950f01c6e518bbdd3b4a278e16ac2d54b8eab54266d5135f8e82f4de5e261a674c90de444e7089782d5d8a1
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
gpfjx.exevstq.exeheseque.exepid process 1608 gpfjx.exe 3060 vstq.exe 2068 heseque.exe -
Drops file in Windows directory 5 IoCs
Processes:
vstq.exef17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f.exegpfjx.exedescription ioc process File created C:\Windows\Tasks\heseque.job vstq.exe File opened for modification C:\Windows\Tasks\heseque.job vstq.exe File created C:\Windows\Tasks\gpfjx.job f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f.exe File opened for modification C:\Windows\Tasks\gpfjx.job f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f.exe File created C:\Windows\Tasks\nocahgnltradkjqpwue.job gpfjx.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2152 3496 WerFault.exe f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f.exevstq.exepid process 3496 f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f.exe 3496 f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f.exe 3060 vstq.exe 3060 vstq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f.exe"C:\Users\Admin\AppData\Local\Temp\f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 9482⤵
- Program crash
PID:2152
-
-
C:\ProgramData\jidu\gpfjx.exeC:\ProgramData\jidu\gpfjx.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3496 -ip 34961⤵PID:2188
-
C:\Windows\TEMP\vstq.exeC:\Windows\TEMP\vstq.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3060
-
C:\ProgramData\pkuit\heseque.exeC:\ProgramData\pkuit\heseque.exe start1⤵
- Executes dropped EXE
PID:2068
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4417e4db8f9d2e891432de2af78b29ac
SHA1dc9f0732d9681a1fbe545d4df05536b5eaba2461
SHA256f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f
SHA5121da861d7f14948158614798a4d1a2372e668ab53d950f01c6e518bbdd3b4a278e16ac2d54b8eab54266d5135f8e82f4de5e261a674c90de444e7089782d5d8a1
-
MD5
4417e4db8f9d2e891432de2af78b29ac
SHA1dc9f0732d9681a1fbe545d4df05536b5eaba2461
SHA256f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f
SHA5121da861d7f14948158614798a4d1a2372e668ab53d950f01c6e518bbdd3b4a278e16ac2d54b8eab54266d5135f8e82f4de5e261a674c90de444e7089782d5d8a1
-
MD5
4417e4db8f9d2e891432de2af78b29ac
SHA1dc9f0732d9681a1fbe545d4df05536b5eaba2461
SHA256f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f
SHA5121da861d7f14948158614798a4d1a2372e668ab53d950f01c6e518bbdd3b4a278e16ac2d54b8eab54266d5135f8e82f4de5e261a674c90de444e7089782d5d8a1
-
MD5
4417e4db8f9d2e891432de2af78b29ac
SHA1dc9f0732d9681a1fbe545d4df05536b5eaba2461
SHA256f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f
SHA5121da861d7f14948158614798a4d1a2372e668ab53d950f01c6e518bbdd3b4a278e16ac2d54b8eab54266d5135f8e82f4de5e261a674c90de444e7089782d5d8a1
-
MD5
4417e4db8f9d2e891432de2af78b29ac
SHA1dc9f0732d9681a1fbe545d4df05536b5eaba2461
SHA256f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f
SHA5121da861d7f14948158614798a4d1a2372e668ab53d950f01c6e518bbdd3b4a278e16ac2d54b8eab54266d5135f8e82f4de5e261a674c90de444e7089782d5d8a1
-
MD5
772098a8009183d7681a63dffe4cc96d
SHA1b1d151e9c786d945002ffc8ba13230aa8060b1c9
SHA2564d9bb4c8cf3bd46020f970519ec7163eb2b790d077a114bb0aafb483e24a25f3
SHA5123f527ae1b89451a7d48ad76d43ed7e2dead90e8f1eb19edc7a5a49860bf7e6fb463860e5b6b00385dea0706ab7e3e8c0a01ed46bb2a79f88db1cf6242fa93c87
-
MD5
4417e4db8f9d2e891432de2af78b29ac
SHA1dc9f0732d9681a1fbe545d4df05536b5eaba2461
SHA256f17ac724c8f09ed76482fde99dc3971818735f9db0481f5914ec7684ca495c5f
SHA5121da861d7f14948158614798a4d1a2372e668ab53d950f01c6e518bbdd3b4a278e16ac2d54b8eab54266d5135f8e82f4de5e261a674c90de444e7089782d5d8a1