Analysis
-
max time kernel
4294223s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
24-03-2022 13:42
Static task
static1
Behavioral task
behavioral1
Sample
776dea13d3659a794cea95d8df98ef04d467959bf77358dba1ec06fb80a24bc2.exe
Resource
win7-20220310-en
General
-
Target
776dea13d3659a794cea95d8df98ef04d467959bf77358dba1ec06fb80a24bc2.exe
-
Size
359KB
-
MD5
e7257f950392e2d066876e0f2c0f4edc
-
SHA1
85d70a406fec548e52086ea5da1c7d106be5c2c9
-
SHA256
776dea13d3659a794cea95d8df98ef04d467959bf77358dba1ec06fb80a24bc2
-
SHA512
885a33de76be19e876299a7e030e80ce734065d2bf46a0cea2900ea706197e6abf898ee24929e26040748a0fd1be53ae96d891b76051cce56f7bd34cb2e7690d
Malware Config
Extracted
systembc
172.105.196.152:4114
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
acigpuq.exepid process 836 acigpuq.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org 6 ip4.seeip.org 7 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
776dea13d3659a794cea95d8df98ef04d467959bf77358dba1ec06fb80a24bc2.exedescription ioc process File created C:\Windows\Tasks\acigpuq.job 776dea13d3659a794cea95d8df98ef04d467959bf77358dba1ec06fb80a24bc2.exe File opened for modification C:\Windows\Tasks\acigpuq.job 776dea13d3659a794cea95d8df98ef04d467959bf77358dba1ec06fb80a24bc2.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
776dea13d3659a794cea95d8df98ef04d467959bf77358dba1ec06fb80a24bc2.exepid process 1888 776dea13d3659a794cea95d8df98ef04d467959bf77358dba1ec06fb80a24bc2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1792 wrote to memory of 836 1792 taskeng.exe acigpuq.exe PID 1792 wrote to memory of 836 1792 taskeng.exe acigpuq.exe PID 1792 wrote to memory of 836 1792 taskeng.exe acigpuq.exe PID 1792 wrote to memory of 836 1792 taskeng.exe acigpuq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\776dea13d3659a794cea95d8df98ef04d467959bf77358dba1ec06fb80a24bc2.exe"C:\Users\Admin\AppData\Local\Temp\776dea13d3659a794cea95d8df98ef04d467959bf77358dba1ec06fb80a24bc2.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
C:\Windows\system32\taskeng.exetaskeng.exe {40072479-D7B0-4B8B-A6A7-47DCD3BCF103} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\ProgramData\kekvrnd\acigpuq.exeC:\ProgramData\kekvrnd\acigpuq.exe start2⤵
- Executes dropped EXE
PID:836
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e7257f950392e2d066876e0f2c0f4edc
SHA185d70a406fec548e52086ea5da1c7d106be5c2c9
SHA256776dea13d3659a794cea95d8df98ef04d467959bf77358dba1ec06fb80a24bc2
SHA512885a33de76be19e876299a7e030e80ce734065d2bf46a0cea2900ea706197e6abf898ee24929e26040748a0fd1be53ae96d891b76051cce56f7bd34cb2e7690d
-
MD5
e7257f950392e2d066876e0f2c0f4edc
SHA185d70a406fec548e52086ea5da1c7d106be5c2c9
SHA256776dea13d3659a794cea95d8df98ef04d467959bf77358dba1ec06fb80a24bc2
SHA512885a33de76be19e876299a7e030e80ce734065d2bf46a0cea2900ea706197e6abf898ee24929e26040748a0fd1be53ae96d891b76051cce56f7bd34cb2e7690d