Analysis
-
max time kernel
4294183s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
21-03-2022 08:11
Static task
static1
Behavioral task
behavioral1
Sample
572eb88ef3e508c0556d55b4e7f649bd.exe
Resource
win7-20220310-en
General
-
Target
572eb88ef3e508c0556d55b4e7f649bd.exe
-
Size
237KB
-
MD5
572eb88ef3e508c0556d55b4e7f649bd
-
SHA1
a2251c07ea52e9886be15835d45eac41c24af78d
-
SHA256
bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
-
SHA512
8f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
acckhkm.exepfcowc.exeibrv.exepid process 1544 acckhkm.exe 480 pfcowc.exe 608 ibrv.exe -
Drops file in Windows directory 5 IoCs
Processes:
572eb88ef3e508c0556d55b4e7f649bd.exeacckhkm.exepfcowc.exedescription ioc process File opened for modification C:\Windows\Tasks\acckhkm.job 572eb88ef3e508c0556d55b4e7f649bd.exe File created C:\Windows\Tasks\fejrnrdtktvgoktktox.job acckhkm.exe File created C:\Windows\Tasks\ibrv.job pfcowc.exe File opened for modification C:\Windows\Tasks\ibrv.job pfcowc.exe File created C:\Windows\Tasks\acckhkm.job 572eb88ef3e508c0556d55b4e7f649bd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
572eb88ef3e508c0556d55b4e7f649bd.exepfcowc.exepid process 1500 572eb88ef3e508c0556d55b4e7f649bd.exe 480 pfcowc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
taskeng.exedescription pid process target process PID 1596 wrote to memory of 1544 1596 taskeng.exe acckhkm.exe PID 1596 wrote to memory of 1544 1596 taskeng.exe acckhkm.exe PID 1596 wrote to memory of 1544 1596 taskeng.exe acckhkm.exe PID 1596 wrote to memory of 1544 1596 taskeng.exe acckhkm.exe PID 1596 wrote to memory of 480 1596 taskeng.exe pfcowc.exe PID 1596 wrote to memory of 480 1596 taskeng.exe pfcowc.exe PID 1596 wrote to memory of 480 1596 taskeng.exe pfcowc.exe PID 1596 wrote to memory of 480 1596 taskeng.exe pfcowc.exe PID 1596 wrote to memory of 608 1596 taskeng.exe ibrv.exe PID 1596 wrote to memory of 608 1596 taskeng.exe ibrv.exe PID 1596 wrote to memory of 608 1596 taskeng.exe ibrv.exe PID 1596 wrote to memory of 608 1596 taskeng.exe ibrv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\572eb88ef3e508c0556d55b4e7f649bd.exe"C:\Users\Admin\AppData\Local\Temp\572eb88ef3e508c0556d55b4e7f649bd.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
C:\Windows\system32\taskeng.exetaskeng.exe {9FE93EAD-3560-4ECE-8E8A-AC3E0C528700} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\ProgramData\aasi\acckhkm.exeC:\ProgramData\aasi\acckhkm.exe start2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1544 -
C:\Windows\TEMP\pfcowc.exeC:\Windows\TEMP\pfcowc.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:480 -
C:\ProgramData\matqf\ibrv.exeC:\ProgramData\matqf\ibrv.exe start2⤵
- Executes dropped EXE
PID:608
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\aasi\acckhkm.exeMD5
572eb88ef3e508c0556d55b4e7f649bd
SHA1a2251c07ea52e9886be15835d45eac41c24af78d
SHA256bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
SHA5128f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9
-
C:\ProgramData\aasi\acckhkm.exeMD5
572eb88ef3e508c0556d55b4e7f649bd
SHA1a2251c07ea52e9886be15835d45eac41c24af78d
SHA256bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
SHA5128f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9
-
C:\ProgramData\matqf\ibrv.exeMD5
572eb88ef3e508c0556d55b4e7f649bd
SHA1a2251c07ea52e9886be15835d45eac41c24af78d
SHA256bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
SHA5128f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9
-
C:\ProgramData\matqf\ibrv.exeMD5
572eb88ef3e508c0556d55b4e7f649bd
SHA1a2251c07ea52e9886be15835d45eac41c24af78d
SHA256bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
SHA5128f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9
-
C:\Windows\TEMP\pfcowc.exeMD5
572eb88ef3e508c0556d55b4e7f649bd
SHA1a2251c07ea52e9886be15835d45eac41c24af78d
SHA256bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
SHA5128f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9
-
C:\Windows\Tasks\acckhkm.jobMD5
a75ad800416631e6488d8e171062f32d
SHA18cda3e454224546325b0835788b07d7e5c116235
SHA256de96ea9667c45d79a64d5700a3885f2e2458020083f03360fdba4d931ad498e5
SHA512818f7aef90b2857a0959746a8675203e414d215389c7ff18e76f68f05006bcec9ee7b52086669dffb360fb13b2bb50c2c376f3ad1688a4083d082fda84f17f34
-
C:\Windows\Temp\pfcowc.exeMD5
572eb88ef3e508c0556d55b4e7f649bd
SHA1a2251c07ea52e9886be15835d45eac41c24af78d
SHA256bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
SHA5128f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9
-
memory/480-71-0x000000000055E000-0x0000000000567000-memory.dmpFilesize
36KB
-
memory/480-68-0x000000000055E000-0x0000000000567000-memory.dmpFilesize
36KB
-
memory/480-72-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/608-78-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/608-77-0x000000000065E000-0x0000000000667000-memory.dmpFilesize
36KB
-
memory/608-75-0x000000000065E000-0x0000000000667000-memory.dmpFilesize
36KB
-
memory/1500-56-0x0000000000220000-0x0000000000229000-memory.dmpFilesize
36KB
-
memory/1500-57-0x0000000075AA1000-0x0000000075AA3000-memory.dmpFilesize
8KB
-
memory/1500-54-0x000000000065E000-0x0000000000667000-memory.dmpFilesize
36KB
-
memory/1500-58-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/1500-55-0x000000000065E000-0x0000000000667000-memory.dmpFilesize
36KB
-
memory/1544-64-0x0000000000220000-0x0000000000229000-memory.dmpFilesize
36KB
-
memory/1544-61-0x000000000058E000-0x0000000000597000-memory.dmpFilesize
36KB
-
memory/1544-65-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/1544-63-0x000000000058E000-0x0000000000597000-memory.dmpFilesize
36KB