Analysis
-
max time kernel
4294238s -
max time network
201s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
19-03-2022 13:06
Static task
static1
Behavioral task
behavioral1
Sample
2c0507132507ea5337dcba2ae9e6f786e72f5b43c7a31445a8ea4b836e6843a5.exe
Resource
win7-20220311-en
General
-
Target
2c0507132507ea5337dcba2ae9e6f786e72f5b43c7a31445a8ea4b836e6843a5.exe
-
Size
233KB
-
MD5
6058208ac500aeee298159954796fd68
-
SHA1
915b8375b99b004b93e7a5af23dbcf6e3f6c55ae
-
SHA256
2c0507132507ea5337dcba2ae9e6f786e72f5b43c7a31445a8ea4b836e6843a5
-
SHA512
24a8f8a21c39a432b46103ca91bd24ab7c13633915bbcc1dea9333cab4c448d152ed67221398033fe858b024ba620711e69b04914cfa2b2cbe789b25e69a5cca
Malware Config
Extracted
systembc
dec15coma.com:4039
dec15coma.xyz:4039
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
hdcmsx.exepid process 668 hdcmsx.exe -
Processes:
resource yara_rule C:\ProgramData\vfqhrie\hdcmsx.exe upx C:\ProgramData\vfqhrie\hdcmsx.exe upx -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
2c0507132507ea5337dcba2ae9e6f786e72f5b43c7a31445a8ea4b836e6843a5.exedescription ioc process File created C:\Windows\Tasks\hdcmsx.job 2c0507132507ea5337dcba2ae9e6f786e72f5b43c7a31445a8ea4b836e6843a5.exe File opened for modification C:\Windows\Tasks\hdcmsx.job 2c0507132507ea5337dcba2ae9e6f786e72f5b43c7a31445a8ea4b836e6843a5.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
2c0507132507ea5337dcba2ae9e6f786e72f5b43c7a31445a8ea4b836e6843a5.exepid process 1096 2c0507132507ea5337dcba2ae9e6f786e72f5b43c7a31445a8ea4b836e6843a5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1972 wrote to memory of 668 1972 taskeng.exe hdcmsx.exe PID 1972 wrote to memory of 668 1972 taskeng.exe hdcmsx.exe PID 1972 wrote to memory of 668 1972 taskeng.exe hdcmsx.exe PID 1972 wrote to memory of 668 1972 taskeng.exe hdcmsx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c0507132507ea5337dcba2ae9e6f786e72f5b43c7a31445a8ea4b836e6843a5.exe"C:\Users\Admin\AppData\Local\Temp\2c0507132507ea5337dcba2ae9e6f786e72f5b43c7a31445a8ea4b836e6843a5.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
C:\Windows\system32\taskeng.exetaskeng.exe {9B6E93AB-FA2C-41D0-9714-54DE01170A50} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\ProgramData\vfqhrie\hdcmsx.exeC:\ProgramData\vfqhrie\hdcmsx.exe start2⤵
- Executes dropped EXE
PID:668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
6058208ac500aeee298159954796fd68
SHA1915b8375b99b004b93e7a5af23dbcf6e3f6c55ae
SHA2562c0507132507ea5337dcba2ae9e6f786e72f5b43c7a31445a8ea4b836e6843a5
SHA51224a8f8a21c39a432b46103ca91bd24ab7c13633915bbcc1dea9333cab4c448d152ed67221398033fe858b024ba620711e69b04914cfa2b2cbe789b25e69a5cca
-
MD5
6058208ac500aeee298159954796fd68
SHA1915b8375b99b004b93e7a5af23dbcf6e3f6c55ae
SHA2562c0507132507ea5337dcba2ae9e6f786e72f5b43c7a31445a8ea4b836e6843a5
SHA51224a8f8a21c39a432b46103ca91bd24ab7c13633915bbcc1dea9333cab4c448d152ed67221398033fe858b024ba620711e69b04914cfa2b2cbe789b25e69a5cca