Analysis
-
max time kernel
4294210s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
20-03-2022 05:39
Static task
static1
Behavioral task
behavioral1
Sample
d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415.exe
Resource
win7-20220311-en
General
-
Target
d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415.exe
-
Size
173KB
-
MD5
cbdfe40fef7a9604064f8494f73e49bc
-
SHA1
09bf2fcb2f8c54e752eb5a10f2b6fc66d584b43e
-
SHA256
d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415
-
SHA512
bee9514bd26fa31ba4977c4088d584884861dba4a9e69264e95a1fc5804edde3310ddc07f762d9908cfbf8c6436a32bd4b7539ac254913b2fa97c528bf1238dd
Malware Config
Extracted
systembc
dec15coma.com:4039
dec15coma.xyz:4039
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
dcocx.exepid process 1900 dcocx.exe -
Processes:
resource yara_rule C:\ProgramData\mxavl\dcocx.exe upx C:\ProgramData\mxavl\dcocx.exe upx -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415.exedescription ioc process File created C:\Windows\Tasks\dcocx.job d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415.exe File opened for modification C:\Windows\Tasks\dcocx.job d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415.exepid process 1616 d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1096 wrote to memory of 1900 1096 taskeng.exe dcocx.exe PID 1096 wrote to memory of 1900 1096 taskeng.exe dcocx.exe PID 1096 wrote to memory of 1900 1096 taskeng.exe dcocx.exe PID 1096 wrote to memory of 1900 1096 taskeng.exe dcocx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415.exe"C:\Users\Admin\AppData\Local\Temp\d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
C:\Windows\system32\taskeng.exetaskeng.exe {2DD0F921-570C-4F36-B524-A20D928B1F2E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\ProgramData\mxavl\dcocx.exeC:\ProgramData\mxavl\dcocx.exe start2⤵
- Executes dropped EXE
PID:1900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
cbdfe40fef7a9604064f8494f73e49bc
SHA109bf2fcb2f8c54e752eb5a10f2b6fc66d584b43e
SHA256d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415
SHA512bee9514bd26fa31ba4977c4088d584884861dba4a9e69264e95a1fc5804edde3310ddc07f762d9908cfbf8c6436a32bd4b7539ac254913b2fa97c528bf1238dd
-
MD5
cbdfe40fef7a9604064f8494f73e49bc
SHA109bf2fcb2f8c54e752eb5a10f2b6fc66d584b43e
SHA256d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415
SHA512bee9514bd26fa31ba4977c4088d584884861dba4a9e69264e95a1fc5804edde3310ddc07f762d9908cfbf8c6436a32bd4b7539ac254913b2fa97c528bf1238dd