Analysis
-
max time kernel
4294210s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
26-03-2022 07:24
Static task
static1
Behavioral task
behavioral1
Sample
a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da.exe
Resource
win7-20220311-en
General
-
Target
a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da.exe
-
Size
285KB
-
MD5
d1cd66d2dca341712b4c6e15649d4a8e
-
SHA1
8cde8dd0bd6271a55fb4de53713255d294ca1b80
-
SHA256
a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da
-
SHA512
39c7be90423d291ea73ee08704024a741cd68e395f46de33d16d2e538a99f4ca58c35f998376814203606e634121fd973311a9621b77e0ab66afb144db32d1e9
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
-
Executes dropped EXE 1 IoCs
Processes:
lfcxud.exepid process 640 lfcxud.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da.exedescription ioc process File created C:\Windows\Tasks\lfcxud.job a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da.exe File opened for modification C:\Windows\Tasks\lfcxud.job a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da.exepid process 1568 a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1468 wrote to memory of 640 1468 taskeng.exe lfcxud.exe PID 1468 wrote to memory of 640 1468 taskeng.exe lfcxud.exe PID 1468 wrote to memory of 640 1468 taskeng.exe lfcxud.exe PID 1468 wrote to memory of 640 1468 taskeng.exe lfcxud.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da.exe"C:\Users\Admin\AppData\Local\Temp\a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1568
-
C:\Windows\system32\taskeng.exetaskeng.exe {1B1F9846-D614-4351-8309-B1BFD82B0DC5} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\ProgramData\jsoe\lfcxud.exeC:\ProgramData\jsoe\lfcxud.exe start2⤵
- Executes dropped EXE
PID:640
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d1cd66d2dca341712b4c6e15649d4a8e
SHA18cde8dd0bd6271a55fb4de53713255d294ca1b80
SHA256a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da
SHA51239c7be90423d291ea73ee08704024a741cd68e395f46de33d16d2e538a99f4ca58c35f998376814203606e634121fd973311a9621b77e0ab66afb144db32d1e9
-
MD5
d1cd66d2dca341712b4c6e15649d4a8e
SHA18cde8dd0bd6271a55fb4de53713255d294ca1b80
SHA256a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da
SHA51239c7be90423d291ea73ee08704024a741cd68e395f46de33d16d2e538a99f4ca58c35f998376814203606e634121fd973311a9621b77e0ab66afb144db32d1e9