Analysis
-
max time kernel
4294219s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
25-03-2022 00:43
Static task
static1
Behavioral task
behavioral1
Sample
6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe
Resource
win7-20220310-en
General
-
Target
6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe
-
Size
276KB
-
MD5
822285256eafa07724fd29f8e85c759e
-
SHA1
5da5dc2c1be087ce6046f6903a6c773b28a3b6cf
-
SHA256
6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42
-
SHA512
4d93d7250dc210fff4d54802253d98f5f868f4a273b0a83207a77617657c2ccc7748c9b6743096c7a9bffa9a24221f014d83986f2b6e7751754bf090b4a6a9a0
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
xtsrir.exepid process 1988 xtsrir.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 api.ipify.org 8 ip4.seeip.org 9 ip4.seeip.org 6 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exedescription ioc process File created C:\Windows\Tasks\xtsrir.job 6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe File opened for modification C:\Windows\Tasks\xtsrir.job 6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exepid process 1836 6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1844 wrote to memory of 1988 1844 taskeng.exe xtsrir.exe PID 1844 wrote to memory of 1988 1844 taskeng.exe xtsrir.exe PID 1844 wrote to memory of 1988 1844 taskeng.exe xtsrir.exe PID 1844 wrote to memory of 1988 1844 taskeng.exe xtsrir.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe"C:\Users\Admin\AppData\Local\Temp\6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
C:\Windows\system32\taskeng.exetaskeng.exe {38E904A7-8EB4-4E90-9AA4-93DD47988C3C} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\ProgramData\uccfia\xtsrir.exeC:\ProgramData\uccfia\xtsrir.exe start2⤵
- Executes dropped EXE
PID:1988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
822285256eafa07724fd29f8e85c759e
SHA15da5dc2c1be087ce6046f6903a6c773b28a3b6cf
SHA2566cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42
SHA5124d93d7250dc210fff4d54802253d98f5f868f4a273b0a83207a77617657c2ccc7748c9b6743096c7a9bffa9a24221f014d83986f2b6e7751754bf090b4a6a9a0
-
MD5
822285256eafa07724fd29f8e85c759e
SHA15da5dc2c1be087ce6046f6903a6c773b28a3b6cf
SHA2566cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42
SHA5124d93d7250dc210fff4d54802253d98f5f868f4a273b0a83207a77617657c2ccc7748c9b6743096c7a9bffa9a24221f014d83986f2b6e7751754bf090b4a6a9a0