Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
26-03-2022 03:08
Static task
static1
Behavioral task
behavioral1
Sample
4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e.exe
Resource
win7-20220310-en
General
-
Target
4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e.exe
-
Size
284KB
-
MD5
7f1fec40c35280a72c4863430821e0b5
-
SHA1
6bc22f20dd9a338224db71dc8856587c48376190
-
SHA256
4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e
-
SHA512
681b745e3fd3aab3ea7c7f65e8bec064a4f067f8dfddae0db7a6a1e58e8fba744cd0846e1b3882d69f16df236e0b064c7cf512ca8c3079f8403ef8374c8b9ca7
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
jsvlbp.exepid process 3400 jsvlbp.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 30 api.ipify.org 31 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e.exedescription ioc process File opened for modification C:\Windows\Tasks\jsvlbp.job 4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e.exe File created C:\Windows\Tasks\jsvlbp.job 4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2264 548 WerFault.exe 4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e.exepid process 548 4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e.exe 548 4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e.exe"C:\Users\Admin\AppData\Local\Temp\4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 9482⤵
- Program crash
PID:2264
-
-
C:\ProgramData\qfrtrom\jsvlbp.exeC:\ProgramData\qfrtrom\jsvlbp.exe start1⤵
- Executes dropped EXE
PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 548 -ip 5481⤵PID:4172
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
7f1fec40c35280a72c4863430821e0b5
SHA16bc22f20dd9a338224db71dc8856587c48376190
SHA2564bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e
SHA512681b745e3fd3aab3ea7c7f65e8bec064a4f067f8dfddae0db7a6a1e58e8fba744cd0846e1b3882d69f16df236e0b064c7cf512ca8c3079f8403ef8374c8b9ca7
-
MD5
7f1fec40c35280a72c4863430821e0b5
SHA16bc22f20dd9a338224db71dc8856587c48376190
SHA2564bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e
SHA512681b745e3fd3aab3ea7c7f65e8bec064a4f067f8dfddae0db7a6a1e58e8fba744cd0846e1b3882d69f16df236e0b064c7cf512ca8c3079f8403ef8374c8b9ca7