Analysis
-
max time kernel
193s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
19-03-2022 18:41
Static task
static1
Behavioral task
behavioral1
Sample
bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe
Resource
win7-20220310-en
General
-
Target
bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe
-
Size
243KB
-
MD5
15f32b4f39a69e327b285b6cd2dd2cb9
-
SHA1
49ca0b152b2001febfe89d4ff2bea2f989a9a819
-
SHA256
bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25
-
SHA512
301893a9827946bd478255cc9cbc054c21a422e76bad3f0ded321d264ff14947e1736dd66cedc236a9d82afcd0c2f0c40f5a91d57266ee49acdc6acd14767f84
Malware Config
Extracted
systembc
dec15coma.com:4039
dec15coma.xyz:4039
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
bmab.exepid process 4744 bmab.exe -
Processes:
resource yara_rule C:\ProgramData\xgku\bmab.exe upx C:\ProgramData\xgku\bmab.exe upx -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 28 api.ipify.org 29 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exedescription ioc process File opened for modification C:\Windows\Tasks\bmab.job bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe File created C:\Windows\Tasks\bmab.job bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 396 1224 WerFault.exe bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exepid process 1224 bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe 1224 bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe"C:\Users\Admin\AppData\Local\Temp\bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 9722⤵
- Program crash
PID:396
-
-
C:\ProgramData\xgku\bmab.exeC:\ProgramData\xgku\bmab.exe start1⤵
- Executes dropped EXE
PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1224 -ip 12241⤵PID:376
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
15f32b4f39a69e327b285b6cd2dd2cb9
SHA149ca0b152b2001febfe89d4ff2bea2f989a9a819
SHA256bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25
SHA512301893a9827946bd478255cc9cbc054c21a422e76bad3f0ded321d264ff14947e1736dd66cedc236a9d82afcd0c2f0c40f5a91d57266ee49acdc6acd14767f84
-
MD5
15f32b4f39a69e327b285b6cd2dd2cb9
SHA149ca0b152b2001febfe89d4ff2bea2f989a9a819
SHA256bac4b948f4a8cb9c61c6167c7aa814affe670e527190aacf4f31eace55236d25
SHA512301893a9827946bd478255cc9cbc054c21a422e76bad3f0ded321d264ff14947e1736dd66cedc236a9d82afcd0c2f0c40f5a91d57266ee49acdc6acd14767f84