Analysis
-
max time kernel
153s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
26-03-2022 12:12
Static task
static1
Behavioral task
behavioral1
Sample
3fa6ec8527cec4045940e5d3fdaa518b23fd38f5d11645ee72e618d992b2bbb4.exe
Resource
win7-20220311-en
General
-
Target
3fa6ec8527cec4045940e5d3fdaa518b23fd38f5d11645ee72e618d992b2bbb4.exe
-
Size
292KB
-
MD5
ab30424e59121773bcf6907da3676128
-
SHA1
94678f7fa6ea216e695bc19ff07f726122ebac68
-
SHA256
3fa6ec8527cec4045940e5d3fdaa518b23fd38f5d11645ee72e618d992b2bbb4
-
SHA512
0d19a610c2e465aff97ce0c3548dbc56baf7f5460d5bb950fc36274cd69fe83c6ab46464d4f57561d8186dfa98fae00ec9984669e7066a00ef4d4221c9a397ac
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
quqj.exepid process 4224 quqj.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 35 api.ipify.org 36 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
3fa6ec8527cec4045940e5d3fdaa518b23fd38f5d11645ee72e618d992b2bbb4.exedescription ioc process File created C:\Windows\Tasks\quqj.job 3fa6ec8527cec4045940e5d3fdaa518b23fd38f5d11645ee72e618d992b2bbb4.exe File opened for modification C:\Windows\Tasks\quqj.job 3fa6ec8527cec4045940e5d3fdaa518b23fd38f5d11645ee72e618d992b2bbb4.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3472 2708 WerFault.exe 3fa6ec8527cec4045940e5d3fdaa518b23fd38f5d11645ee72e618d992b2bbb4.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
3fa6ec8527cec4045940e5d3fdaa518b23fd38f5d11645ee72e618d992b2bbb4.exepid process 2708 3fa6ec8527cec4045940e5d3fdaa518b23fd38f5d11645ee72e618d992b2bbb4.exe 2708 3fa6ec8527cec4045940e5d3fdaa518b23fd38f5d11645ee72e618d992b2bbb4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fa6ec8527cec4045940e5d3fdaa518b23fd38f5d11645ee72e618d992b2bbb4.exe"C:\Users\Admin\AppData\Local\Temp\3fa6ec8527cec4045940e5d3fdaa518b23fd38f5d11645ee72e618d992b2bbb4.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 9522⤵
- Program crash
PID:3472
-
-
C:\ProgramData\uuviucn\quqj.exeC:\ProgramData\uuviucn\quqj.exe start1⤵
- Executes dropped EXE
PID:4224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2708 -ip 27081⤵PID:4044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD5ab30424e59121773bcf6907da3676128
SHA194678f7fa6ea216e695bc19ff07f726122ebac68
SHA2563fa6ec8527cec4045940e5d3fdaa518b23fd38f5d11645ee72e618d992b2bbb4
SHA5120d19a610c2e465aff97ce0c3548dbc56baf7f5460d5bb950fc36274cd69fe83c6ab46464d4f57561d8186dfa98fae00ec9984669e7066a00ef4d4221c9a397ac
-
Filesize
292KB
MD5ab30424e59121773bcf6907da3676128
SHA194678f7fa6ea216e695bc19ff07f726122ebac68
SHA2563fa6ec8527cec4045940e5d3fdaa518b23fd38f5d11645ee72e618d992b2bbb4
SHA5120d19a610c2e465aff97ce0c3548dbc56baf7f5460d5bb950fc36274cd69fe83c6ab46464d4f57561d8186dfa98fae00ec9984669e7066a00ef4d4221c9a397ac