Analysis
-
max time kernel
4294216s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
26-03-2022 00:38
Static task
static1
Behavioral task
behavioral1
Sample
b87961b51b3b2958a9b2a0dd6e0f56edb0efb52fdcc68aa553097c2ea5f52e4e.exe
Resource
win7-20220311-en
General
-
Target
b87961b51b3b2958a9b2a0dd6e0f56edb0efb52fdcc68aa553097c2ea5f52e4e.exe
-
Size
285KB
-
MD5
44104370647086089833d115c55f6d7f
-
SHA1
502c3678a36c7433bc402f787cc0f0c7cc7eec29
-
SHA256
b87961b51b3b2958a9b2a0dd6e0f56edb0efb52fdcc68aa553097c2ea5f52e4e
-
SHA512
a91ca5aa9dfa02f35ef2344b3485e28ab55f41fc4d0f38a9d176b959e10cbfdba8a79b304d67ec3e1478ed9270e3e79855bd352a932e3845e8141ac471b2b29e
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
qjdx.exepid process 772 qjdx.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ip4.seeip.org 8 ip4.seeip.org 5 api.ipify.org 6 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
b87961b51b3b2958a9b2a0dd6e0f56edb0efb52fdcc68aa553097c2ea5f52e4e.exedescription ioc process File created C:\Windows\Tasks\qjdx.job b87961b51b3b2958a9b2a0dd6e0f56edb0efb52fdcc68aa553097c2ea5f52e4e.exe File opened for modification C:\Windows\Tasks\qjdx.job b87961b51b3b2958a9b2a0dd6e0f56edb0efb52fdcc68aa553097c2ea5f52e4e.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
b87961b51b3b2958a9b2a0dd6e0f56edb0efb52fdcc68aa553097c2ea5f52e4e.exepid process 1088 b87961b51b3b2958a9b2a0dd6e0f56edb0efb52fdcc68aa553097c2ea5f52e4e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 552 wrote to memory of 772 552 taskeng.exe qjdx.exe PID 552 wrote to memory of 772 552 taskeng.exe qjdx.exe PID 552 wrote to memory of 772 552 taskeng.exe qjdx.exe PID 552 wrote to memory of 772 552 taskeng.exe qjdx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b87961b51b3b2958a9b2a0dd6e0f56edb0efb52fdcc68aa553097c2ea5f52e4e.exe"C:\Users\Admin\AppData\Local\Temp\b87961b51b3b2958a9b2a0dd6e0f56edb0efb52fdcc68aa553097c2ea5f52e4e.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
C:\Windows\system32\taskeng.exetaskeng.exe {8BE72859-8E3C-44EF-9012-2EB6BA2EC885} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\ProgramData\rghref\qjdx.exeC:\ProgramData\rghref\qjdx.exe start2⤵
- Executes dropped EXE
PID:772
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
44104370647086089833d115c55f6d7f
SHA1502c3678a36c7433bc402f787cc0f0c7cc7eec29
SHA256b87961b51b3b2958a9b2a0dd6e0f56edb0efb52fdcc68aa553097c2ea5f52e4e
SHA512a91ca5aa9dfa02f35ef2344b3485e28ab55f41fc4d0f38a9d176b959e10cbfdba8a79b304d67ec3e1478ed9270e3e79855bd352a932e3845e8141ac471b2b29e
-
MD5
44104370647086089833d115c55f6d7f
SHA1502c3678a36c7433bc402f787cc0f0c7cc7eec29
SHA256b87961b51b3b2958a9b2a0dd6e0f56edb0efb52fdcc68aa553097c2ea5f52e4e
SHA512a91ca5aa9dfa02f35ef2344b3485e28ab55f41fc4d0f38a9d176b959e10cbfdba8a79b304d67ec3e1478ed9270e3e79855bd352a932e3845e8141ac471b2b29e