Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
14-03-2022 13:30
Static task
static1
General
-
Target
bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810.exe
-
Size
237KB
-
MD5
572eb88ef3e508c0556d55b4e7f649bd
-
SHA1
a2251c07ea52e9886be15835d45eac41c24af78d
-
SHA256
bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
-
SHA512
8f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
jxoa.exeovwsnni.exeptmm.exepid process 5108 jxoa.exe 3656 ovwsnni.exe 956 ptmm.exe -
Drops file in Windows directory 5 IoCs
Processes:
ovwsnni.exebad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810.exejxoa.exedescription ioc process File created C:\Windows\Tasks\ptmm.job ovwsnni.exe File opened for modification C:\Windows\Tasks\ptmm.job ovwsnni.exe File created C:\Windows\Tasks\jxoa.job bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810.exe File opened for modification C:\Windows\Tasks\jxoa.job bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810.exe File created C:\Windows\Tasks\spjqlmiojkrsnivwrgb.job jxoa.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4888 3304 WerFault.exe bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810.exeovwsnni.exepid process 3304 bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810.exe 3304 bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810.exe 3656 ovwsnni.exe 3656 ovwsnni.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810.exe"C:\Users\Admin\AppData\Local\Temp\bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 4882⤵
- Program crash
PID:4888
-
-
C:\ProgramData\xnqxgo\jxoa.exeC:\ProgramData\xnqxgo\jxoa.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5108
-
C:\Windows\TEMP\ovwsnni.exeC:\Windows\TEMP\ovwsnni.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3304 -ip 33041⤵PID:4304
-
C:\ProgramData\lqebma\ptmm.exeC:\ProgramData\lqebma\ptmm.exe start1⤵
- Executes dropped EXE
PID:956
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
572eb88ef3e508c0556d55b4e7f649bd
SHA1a2251c07ea52e9886be15835d45eac41c24af78d
SHA256bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
SHA5128f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9
-
MD5
572eb88ef3e508c0556d55b4e7f649bd
SHA1a2251c07ea52e9886be15835d45eac41c24af78d
SHA256bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
SHA5128f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9
-
MD5
572eb88ef3e508c0556d55b4e7f649bd
SHA1a2251c07ea52e9886be15835d45eac41c24af78d
SHA256bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
SHA5128f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9
-
MD5
572eb88ef3e508c0556d55b4e7f649bd
SHA1a2251c07ea52e9886be15835d45eac41c24af78d
SHA256bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
SHA5128f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9
-
MD5
572eb88ef3e508c0556d55b4e7f649bd
SHA1a2251c07ea52e9886be15835d45eac41c24af78d
SHA256bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
SHA5128f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9
-
MD5
f98abe295fa4cb5480350c740486c014
SHA13820781eaeaa6688eba9a8905bbb85916e73cac6
SHA256ecdb6de89773db1b0543e6476c60302b1f2062b092544cdbd44f0b5fbb563bbd
SHA512430bb472ad76ec6f18a2ba4179597d147ed23b80291e5fbbbb1da86856f19603f9cb90a93b68c942dee339cd11aac4211c2596f330117c310e7a892eaa3eb62f
-
MD5
572eb88ef3e508c0556d55b4e7f649bd
SHA1a2251c07ea52e9886be15835d45eac41c24af78d
SHA256bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
SHA5128f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9