Analysis
-
max time kernel
4294209s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
19-03-2022 06:55
Static task
static1
Behavioral task
behavioral1
Sample
c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a.exe
Resource
win7-20220311-en
General
-
Target
c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a.exe
-
Size
173KB
-
MD5
b116459b4baffd9c1efd7153884f9d35
-
SHA1
673fd7eb331a1c5645fa4264f85bbd722531f318
-
SHA256
c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a
-
SHA512
6f09a7b7be8a3f4519492d387e2c1441e70cc411eafb2e463ce0f0b802e9b672a60895b778a27adaa5a55d9fd35c3285a342658ca77cd1240c026efb10eea1aa
Malware Config
Extracted
systembc
dec15coma.com:4039
dec15coma.xyz:4039
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
vtan.exepid process 728 vtan.exe -
Processes:
resource yara_rule C:\ProgramData\mgnu\vtan.exe upx C:\ProgramData\mgnu\vtan.exe upx -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a.exedescription ioc process File created C:\Windows\Tasks\vtan.job c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a.exe File opened for modification C:\Windows\Tasks\vtan.job c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a.exepid process 1152 c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 840 wrote to memory of 728 840 taskeng.exe vtan.exe PID 840 wrote to memory of 728 840 taskeng.exe vtan.exe PID 840 wrote to memory of 728 840 taskeng.exe vtan.exe PID 840 wrote to memory of 728 840 taskeng.exe vtan.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a.exe"C:\Users\Admin\AppData\Local\Temp\c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1152
-
C:\Windows\system32\taskeng.exetaskeng.exe {D6550A4C-C31C-47D0-BA87-1B73086FCD12} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\ProgramData\mgnu\vtan.exeC:\ProgramData\mgnu\vtan.exe start2⤵
- Executes dropped EXE
PID:728
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b116459b4baffd9c1efd7153884f9d35
SHA1673fd7eb331a1c5645fa4264f85bbd722531f318
SHA256c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a
SHA5126f09a7b7be8a3f4519492d387e2c1441e70cc411eafb2e463ce0f0b802e9b672a60895b778a27adaa5a55d9fd35c3285a342658ca77cd1240c026efb10eea1aa
-
MD5
b116459b4baffd9c1efd7153884f9d35
SHA1673fd7eb331a1c5645fa4264f85bbd722531f318
SHA256c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a
SHA5126f09a7b7be8a3f4519492d387e2c1441e70cc411eafb2e463ce0f0b802e9b672a60895b778a27adaa5a55d9fd35c3285a342658ca77cd1240c026efb10eea1aa