Analysis
-
max time kernel
4294210s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
26-03-2022 00:30
Static task
static1
Behavioral task
behavioral1
Sample
89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565.exe
Resource
win7-20220310-en
General
-
Target
89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565.exe
-
Size
285KB
-
MD5
ff4d95122ba0a03ff9b3f5b367f96b35
-
SHA1
131e0b509ef92ba9ab6eeebd1e1571bbbe6a1cf2
-
SHA256
89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565
-
SHA512
215285c7c8d8d77be59469c28a31ef1e1536867e3a24e2470b7acb34253f5f555ca2230c1f78fd16da68fad7e587edbac47b8d2588ffde0513a506dce3fe1cfb
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
-
Executes dropped EXE 1 IoCs
Processes:
dmssq.exepid process 1632 dmssq.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565.exedescription ioc process File created C:\Windows\Tasks\dmssq.job 89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565.exe File opened for modification C:\Windows\Tasks\dmssq.job 89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565.exepid process 960 89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1764 wrote to memory of 1632 1764 taskeng.exe dmssq.exe PID 1764 wrote to memory of 1632 1764 taskeng.exe dmssq.exe PID 1764 wrote to memory of 1632 1764 taskeng.exe dmssq.exe PID 1764 wrote to memory of 1632 1764 taskeng.exe dmssq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565.exe"C:\Users\Admin\AppData\Local\Temp\89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:960
-
C:\Windows\system32\taskeng.exetaskeng.exe {7AE4EFDD-3A6F-45AC-A18B-DEF1C58E3CDB} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\ProgramData\bslxe\dmssq.exeC:\ProgramData\bslxe\dmssq.exe start2⤵
- Executes dropped EXE
PID:1632
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ff4d95122ba0a03ff9b3f5b367f96b35
SHA1131e0b509ef92ba9ab6eeebd1e1571bbbe6a1cf2
SHA25689fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565
SHA512215285c7c8d8d77be59469c28a31ef1e1536867e3a24e2470b7acb34253f5f555ca2230c1f78fd16da68fad7e587edbac47b8d2588ffde0513a506dce3fe1cfb
-
MD5
ff4d95122ba0a03ff9b3f5b367f96b35
SHA1131e0b509ef92ba9ab6eeebd1e1571bbbe6a1cf2
SHA25689fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565
SHA512215285c7c8d8d77be59469c28a31ef1e1536867e3a24e2470b7acb34253f5f555ca2230c1f78fd16da68fad7e587edbac47b8d2588ffde0513a506dce3fe1cfb