Analysis
-
max time kernel
4294214s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
19-03-2022 18:41
Static task
static1
Behavioral task
behavioral1
Sample
bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe
Resource
win7-20220310-en
General
-
Target
bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe
-
Size
243KB
-
MD5
15f32b4f39a69e327b285b6cd2dd2cb9
-
SHA1
49ca0b152b2001febfe89d4ff2bea2f989a9a819
-
SHA256
bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25
-
SHA512
301893a9827946bd478255cc9cbc054c21a422e76bad3f0ded321d264ff14947e1736dd66cedc236a9d82afcd0c2f0c40f5a91d57266ee49acdc6acd14767f84
Malware Config
Extracted
systembc
dec15coma.com:4039
dec15coma.xyz:4039
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
omqoju.exepid process 752 omqoju.exe -
Processes:
resource yara_rule C:\ProgramData\juxh\omqoju.exe upx C:\ProgramData\juxh\omqoju.exe upx -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 ip4.seeip.org 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exedescription ioc process File opened for modification C:\Windows\Tasks\omqoju.job bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe File created C:\Windows\Tasks\omqoju.job bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exepid process 1708 bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 928 wrote to memory of 752 928 taskeng.exe omqoju.exe PID 928 wrote to memory of 752 928 taskeng.exe omqoju.exe PID 928 wrote to memory of 752 928 taskeng.exe omqoju.exe PID 928 wrote to memory of 752 928 taskeng.exe omqoju.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe"C:\Users\Admin\AppData\Local\Temp\bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
C:\Windows\system32\taskeng.exetaskeng.exe {30163490-B927-45AD-8CA4-884FF5A1AC5B} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\ProgramData\juxh\omqoju.exeC:\ProgramData\juxh\omqoju.exe start2⤵
- Executes dropped EXE
PID:752
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
15f32b4f39a69e327b285b6cd2dd2cb9
SHA149ca0b152b2001febfe89d4ff2bea2f989a9a819
SHA256bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25
SHA512301893a9827946bd478255cc9cbc054c21a422e76bad3f0ded321d264ff14947e1736dd66cedc236a9d82afcd0c2f0c40f5a91d57266ee49acdc6acd14767f84
-
MD5
15f32b4f39a69e327b285b6cd2dd2cb9
SHA149ca0b152b2001febfe89d4ff2bea2f989a9a819
SHA256bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25
SHA512301893a9827946bd478255cc9cbc054c21a422e76bad3f0ded321d264ff14947e1736dd66cedc236a9d82afcd0c2f0c40f5a91d57266ee49acdc6acd14767f84