Analysis
-
max time kernel
4294229s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
19-03-2022 23:41
Static task
static1
Behavioral task
behavioral1
Sample
8e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0.exe
Resource
win7-20220311-en
General
-
Target
8e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0.exe
-
Size
233KB
-
MD5
cc16e6e7af14fcf5f4a001b85930dc8f
-
SHA1
580b5baff09663396fb27d52e43a58ef25ed43dd
-
SHA256
8e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0
-
SHA512
c451ec2e3056086842b52e8105a04a67a50609d1e8a7c296e7171432ccc5572c62e69b1edb8d6e600ddb451240847ba4d8621452ea99e98036978cc3712274d9
Malware Config
Extracted
systembc
dec15coma.com:4039
dec15coma.xyz:4039
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
foiu.exepid process 1832 foiu.exe -
Processes:
resource yara_rule C:\ProgramData\mfwgf\foiu.exe upx C:\ProgramData\mfwgf\foiu.exe upx -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org 5 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
8e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0.exedescription ioc process File created C:\Windows\Tasks\foiu.job 8e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0.exe File opened for modification C:\Windows\Tasks\foiu.job 8e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
8e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0.exepid process 1356 8e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1796 wrote to memory of 1832 1796 taskeng.exe foiu.exe PID 1796 wrote to memory of 1832 1796 taskeng.exe foiu.exe PID 1796 wrote to memory of 1832 1796 taskeng.exe foiu.exe PID 1796 wrote to memory of 1832 1796 taskeng.exe foiu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0.exe"C:\Users\Admin\AppData\Local\Temp\8e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
C:\Windows\system32\taskeng.exetaskeng.exe {BA8D48AE-A88A-4CC0-9358-961CE05B99A8} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\ProgramData\mfwgf\foiu.exeC:\ProgramData\mfwgf\foiu.exe start2⤵
- Executes dropped EXE
PID:1832
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
cc16e6e7af14fcf5f4a001b85930dc8f
SHA1580b5baff09663396fb27d52e43a58ef25ed43dd
SHA2568e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0
SHA512c451ec2e3056086842b52e8105a04a67a50609d1e8a7c296e7171432ccc5572c62e69b1edb8d6e600ddb451240847ba4d8621452ea99e98036978cc3712274d9
-
MD5
cc16e6e7af14fcf5f4a001b85930dc8f
SHA1580b5baff09663396fb27d52e43a58ef25ed43dd
SHA2568e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0
SHA512c451ec2e3056086842b52e8105a04a67a50609d1e8a7c296e7171432ccc5572c62e69b1edb8d6e600ddb451240847ba4d8621452ea99e98036978cc3712274d9