Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10_x64 -
resource
win10-20220310-en -
submitted
26-03-2022 17:11
Static task
static1
General
-
Target
4d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24.exe
-
Size
227KB
-
MD5
477079b5846088b1e126ae08735d36c1
-
SHA1
8f26d9582fa44498f7a6abb17e45554ca115ab79
-
SHA256
4d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24
-
SHA512
2520257f0a333821d0f39f4db811b422c8cb1d48869a237c39d40fbcd3c49822e17d48d9c854daee807bae2b9b0c2487576e93ccdbff947e82d9cd537c3f58c7
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
jtktrxn.exegjhreor.execefrtnx.exepid process 2400 jtktrxn.exe 3900 gjhreor.exe 604 cefrtnx.exe -
Drops file in Windows directory 5 IoCs
Processes:
4d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24.exejtktrxn.exegjhreor.exedescription ioc process File created C:\Windows\Tasks\jtktrxn.job 4d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24.exe File opened for modification C:\Windows\Tasks\jtktrxn.job 4d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24.exe File created C:\Windows\Tasks\ssvsflqtehhkcofjame.job jtktrxn.exe File created C:\Windows\Tasks\cefrtnx.job gjhreor.exe File opened for modification C:\Windows\Tasks\cefrtnx.job gjhreor.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
4d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24.exegjhreor.exepid process 1852 4d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24.exe 1852 4d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24.exe 3900 gjhreor.exe 3900 gjhreor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24.exe"C:\Users\Admin\AppData\Local\Temp\4d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
C:\ProgramData\tcoxiso\jtktrxn.exeC:\ProgramData\tcoxiso\jtktrxn.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2400
-
C:\Windows\TEMP\gjhreor.exeC:\Windows\TEMP\gjhreor.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
C:\ProgramData\cwrcv\cefrtnx.exeC:\ProgramData\cwrcv\cefrtnx.exe start1⤵
- Executes dropped EXE
PID:604
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
477079b5846088b1e126ae08735d36c1
SHA18f26d9582fa44498f7a6abb17e45554ca115ab79
SHA2564d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24
SHA5122520257f0a333821d0f39f4db811b422c8cb1d48869a237c39d40fbcd3c49822e17d48d9c854daee807bae2b9b0c2487576e93ccdbff947e82d9cd537c3f58c7
-
MD5
477079b5846088b1e126ae08735d36c1
SHA18f26d9582fa44498f7a6abb17e45554ca115ab79
SHA2564d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24
SHA5122520257f0a333821d0f39f4db811b422c8cb1d48869a237c39d40fbcd3c49822e17d48d9c854daee807bae2b9b0c2487576e93ccdbff947e82d9cd537c3f58c7
-
MD5
477079b5846088b1e126ae08735d36c1
SHA18f26d9582fa44498f7a6abb17e45554ca115ab79
SHA2564d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24
SHA5122520257f0a333821d0f39f4db811b422c8cb1d48869a237c39d40fbcd3c49822e17d48d9c854daee807bae2b9b0c2487576e93ccdbff947e82d9cd537c3f58c7
-
MD5
477079b5846088b1e126ae08735d36c1
SHA18f26d9582fa44498f7a6abb17e45554ca115ab79
SHA2564d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24
SHA5122520257f0a333821d0f39f4db811b422c8cb1d48869a237c39d40fbcd3c49822e17d48d9c854daee807bae2b9b0c2487576e93ccdbff947e82d9cd537c3f58c7
-
MD5
477079b5846088b1e126ae08735d36c1
SHA18f26d9582fa44498f7a6abb17e45554ca115ab79
SHA2564d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24
SHA5122520257f0a333821d0f39f4db811b422c8cb1d48869a237c39d40fbcd3c49822e17d48d9c854daee807bae2b9b0c2487576e93ccdbff947e82d9cd537c3f58c7
-
MD5
fdb7fc83c91b6c50b65eab44b1c666e9
SHA1aa0bc81b24b78e4099bafb77a2e3d206d96f3ce5
SHA256abc83b3a56aa5936f8e63436543055cdddd5e47f4c5561bafff34756c2d799bf
SHA512603fe15e8d5a5f2ab762430493ba39bc52800c207a962d8b3065de52a81ac25dab336bf98f79f9ce12c5bf6d8d4b1880e9cdcce6b1835a56a86d1fa9437e6f2b
-
MD5
477079b5846088b1e126ae08735d36c1
SHA18f26d9582fa44498f7a6abb17e45554ca115ab79
SHA2564d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24
SHA5122520257f0a333821d0f39f4db811b422c8cb1d48869a237c39d40fbcd3c49822e17d48d9c854daee807bae2b9b0c2487576e93ccdbff947e82d9cd537c3f58c7