Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10_x64 -
resource
win10-20220223-en -
submitted
26-03-2022 12:35
Static task
static1
General
-
Target
e0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292.exe
-
Size
224KB
-
MD5
1a90b941b51ff18ea75347b05ed93fcf
-
SHA1
e66241d516815618e517a40fda6685bac9d6c36f
-
SHA256
e0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292
-
SHA512
686dce0f08625ef9b718eb964e464d01e896148b961e7734b0dec3678a84b58fc82e50ac7c6c8dfa6e70103a78cc7222f74408dcd3d939b02a1bb813619a57d4
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
qogoo.exelvkb.execofaxrm.exepid process 3924 qogoo.exe 4044 lvkb.exe 3788 cofaxrm.exe -
Drops file in Windows directory 5 IoCs
Processes:
qogoo.exelvkb.exee0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292.exedescription ioc process File created C:\Windows\Tasks\pgsmcwofvnftkcskbrh.job qogoo.exe File created C:\Windows\Tasks\cofaxrm.job lvkb.exe File opened for modification C:\Windows\Tasks\cofaxrm.job lvkb.exe File created C:\Windows\Tasks\qogoo.job e0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292.exe File opened for modification C:\Windows\Tasks\qogoo.job e0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
e0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292.exelvkb.exepid process 1620 e0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292.exe 1620 e0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292.exe 4044 lvkb.exe 4044 lvkb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292.exe"C:\Users\Admin\AppData\Local\Temp\e0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
C:\ProgramData\wotpqgn\qogoo.exeC:\ProgramData\wotpqgn\qogoo.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3924
-
C:\Windows\TEMP\lvkb.exeC:\Windows\TEMP\lvkb.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
C:\ProgramData\wlxaf\cofaxrm.exeC:\ProgramData\wlxaf\cofaxrm.exe start1⤵
- Executes dropped EXE
PID:3788
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1a90b941b51ff18ea75347b05ed93fcf
SHA1e66241d516815618e517a40fda6685bac9d6c36f
SHA256e0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292
SHA512686dce0f08625ef9b718eb964e464d01e896148b961e7734b0dec3678a84b58fc82e50ac7c6c8dfa6e70103a78cc7222f74408dcd3d939b02a1bb813619a57d4
-
MD5
1a90b941b51ff18ea75347b05ed93fcf
SHA1e66241d516815618e517a40fda6685bac9d6c36f
SHA256e0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292
SHA512686dce0f08625ef9b718eb964e464d01e896148b961e7734b0dec3678a84b58fc82e50ac7c6c8dfa6e70103a78cc7222f74408dcd3d939b02a1bb813619a57d4
-
MD5
1a90b941b51ff18ea75347b05ed93fcf
SHA1e66241d516815618e517a40fda6685bac9d6c36f
SHA256e0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292
SHA512686dce0f08625ef9b718eb964e464d01e896148b961e7734b0dec3678a84b58fc82e50ac7c6c8dfa6e70103a78cc7222f74408dcd3d939b02a1bb813619a57d4
-
MD5
1a90b941b51ff18ea75347b05ed93fcf
SHA1e66241d516815618e517a40fda6685bac9d6c36f
SHA256e0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292
SHA512686dce0f08625ef9b718eb964e464d01e896148b961e7734b0dec3678a84b58fc82e50ac7c6c8dfa6e70103a78cc7222f74408dcd3d939b02a1bb813619a57d4
-
MD5
1a90b941b51ff18ea75347b05ed93fcf
SHA1e66241d516815618e517a40fda6685bac9d6c36f
SHA256e0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292
SHA512686dce0f08625ef9b718eb964e464d01e896148b961e7734b0dec3678a84b58fc82e50ac7c6c8dfa6e70103a78cc7222f74408dcd3d939b02a1bb813619a57d4
-
MD5
294cd165a521aec8c025599859798be4
SHA12221803c7ba344b530be3f63481ca21ee216f727
SHA25608755c0b0a348c92ed1e60c9f744718c2c9c4f945652d1c3442f30bc83de49d1
SHA512d58eca4077a037a873fdec1498e0d5b37b69873a1cc2a699eb06f88ff22c9e9826eb09c5700627641919f75e1673ef5319bfec824a217f5457a7c7dd502c9802
-
MD5
1a90b941b51ff18ea75347b05ed93fcf
SHA1e66241d516815618e517a40fda6685bac9d6c36f
SHA256e0a7a8197faff39623a3acf0f7d50d13db0b1bb3f6d45da634146fb9ecfa1292
SHA512686dce0f08625ef9b718eb964e464d01e896148b961e7734b0dec3678a84b58fc82e50ac7c6c8dfa6e70103a78cc7222f74408dcd3d939b02a1bb813619a57d4