Analysis
-
max time kernel
164s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
19-03-2022 10:55
Static task
static1
Behavioral task
behavioral1
Sample
bbd8d78a0c241948acda56a12e92efcbeaff2b89443c33135113ccd508e646bd.exe
Resource
win7-20220311-en
General
-
Target
bbd8d78a0c241948acda56a12e92efcbeaff2b89443c33135113ccd508e646bd.exe
-
Size
234KB
-
MD5
f36c144d3572825d5a4bbe01fc6b2e5f
-
SHA1
13c0276832e96446fc927cf77b057194a7326cc6
-
SHA256
bbd8d78a0c241948acda56a12e92efcbeaff2b89443c33135113ccd508e646bd
-
SHA512
666346ee29abf0caa8314226c421a2ca358d8239ecc59c8e7b5ebe8fdeb2ccb0fab39f528c5bd0042d47dfcf2061e99c36363b10ef905e48f4ad129574ca7181
Malware Config
Extracted
systembc
dec15coma.com:4039
dec15coma.xyz:4039
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
cgekq.exepid process 2444 cgekq.exe -
Processes:
resource yara_rule C:\ProgramData\pbvvca\cgekq.exe upx C:\ProgramData\pbvvca\cgekq.exe upx -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 40 api.ipify.org 39 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
bbd8d78a0c241948acda56a12e92efcbeaff2b89443c33135113ccd508e646bd.exedescription ioc process File created C:\Windows\Tasks\cgekq.job bbd8d78a0c241948acda56a12e92efcbeaff2b89443c33135113ccd508e646bd.exe File opened for modification C:\Windows\Tasks\cgekq.job bbd8d78a0c241948acda56a12e92efcbeaff2b89443c33135113ccd508e646bd.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3740 2692 WerFault.exe bbd8d78a0c241948acda56a12e92efcbeaff2b89443c33135113ccd508e646bd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
bbd8d78a0c241948acda56a12e92efcbeaff2b89443c33135113ccd508e646bd.exepid process 2692 bbd8d78a0c241948acda56a12e92efcbeaff2b89443c33135113ccd508e646bd.exe 2692 bbd8d78a0c241948acda56a12e92efcbeaff2b89443c33135113ccd508e646bd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbd8d78a0c241948acda56a12e92efcbeaff2b89443c33135113ccd508e646bd.exe"C:\Users\Admin\AppData\Local\Temp\bbd8d78a0c241948acda56a12e92efcbeaff2b89443c33135113ccd508e646bd.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 9522⤵
- Program crash
PID:3740
-
-
C:\ProgramData\pbvvca\cgekq.exeC:\ProgramData\pbvvca\cgekq.exe start1⤵
- Executes dropped EXE
PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2692 -ip 26921⤵PID:3672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f36c144d3572825d5a4bbe01fc6b2e5f
SHA113c0276832e96446fc927cf77b057194a7326cc6
SHA256bbd8d78a0c241948acda56a12e92efcbeaff2b89443c33135113ccd508e646bd
SHA512666346ee29abf0caa8314226c421a2ca358d8239ecc59c8e7b5ebe8fdeb2ccb0fab39f528c5bd0042d47dfcf2061e99c36363b10ef905e48f4ad129574ca7181
-
MD5
f36c144d3572825d5a4bbe01fc6b2e5f
SHA113c0276832e96446fc927cf77b057194a7326cc6
SHA256bbd8d78a0c241948acda56a12e92efcbeaff2b89443c33135113ccd508e646bd
SHA512666346ee29abf0caa8314226c421a2ca358d8239ecc59c8e7b5ebe8fdeb2ccb0fab39f528c5bd0042d47dfcf2061e99c36363b10ef905e48f4ad129574ca7181