Analysis
-
max time kernel
162s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
21-03-2022 08:11
Static task
static1
Behavioral task
behavioral1
Sample
572eb88ef3e508c0556d55b4e7f649bd.exe
Resource
win7-20220310-en
General
-
Target
572eb88ef3e508c0556d55b4e7f649bd.exe
-
Size
237KB
-
MD5
572eb88ef3e508c0556d55b4e7f649bd
-
SHA1
a2251c07ea52e9886be15835d45eac41c24af78d
-
SHA256
bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
-
SHA512
8f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
wueled.exepid process 1076 wueled.exe -
Drops file in Windows directory 3 IoCs
Processes:
572eb88ef3e508c0556d55b4e7f649bd.exewueled.exedescription ioc process File created C:\Windows\Tasks\wueled.job 572eb88ef3e508c0556d55b4e7f649bd.exe File opened for modification C:\Windows\Tasks\wueled.job 572eb88ef3e508c0556d55b4e7f649bd.exe File created C:\Windows\Tasks\igjuwprdfhitvxkmnpc.job wueled.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2636 2956 WerFault.exe 572eb88ef3e508c0556d55b4e7f649bd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
572eb88ef3e508c0556d55b4e7f649bd.exepid process 2956 572eb88ef3e508c0556d55b4e7f649bd.exe 2956 572eb88ef3e508c0556d55b4e7f649bd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\572eb88ef3e508c0556d55b4e7f649bd.exe"C:\Users\Admin\AppData\Local\Temp\572eb88ef3e508c0556d55b4e7f649bd.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 4882⤵
- Program crash
PID:2636
-
-
C:\ProgramData\eolwu\wueled.exeC:\ProgramData\eolwu\wueled.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2956 -ip 29561⤵PID:4276
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
572eb88ef3e508c0556d55b4e7f649bd
SHA1a2251c07ea52e9886be15835d45eac41c24af78d
SHA256bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
SHA5128f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9
-
MD5
572eb88ef3e508c0556d55b4e7f649bd
SHA1a2251c07ea52e9886be15835d45eac41c24af78d
SHA256bad62abd7ad29c3d1379bd06439b3208549ceff63772420104c1b322a4abc810
SHA5128f9ed7ae2b94a3a6cb7e70a7192509d5dc8a8d728bedcdd01c2129608edbc0fc5c6b487733de72d54ba7dda438df7887381669466759d3e5bd8a8835b32335e9