Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows10_x64 -
resource
win10-20220223-en -
submitted
26-03-2022 20:18
Static task
static1
General
-
Target
5b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792.exe
-
Size
230KB
-
MD5
51f607442fbf580ed8292dfcdfa5737c
-
SHA1
d34bbbae67b70c92791662b28e7518e0b72a7727
-
SHA256
5b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792
-
SHA512
282ccc2afcac56077aaace23ae8ad225ae464f7db2f22d9a37372f827ca5ea58289e5792ff32aba5909c82d93a6e751dba317694722c808d4e559cb5a43a1c8c
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
fjqjgdk.exegavm.exeprwfo.exepid process 2468 fjqjgdk.exe 3880 gavm.exe 3800 prwfo.exe -
Drops file in Windows directory 5 IoCs
Processes:
5b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792.exefjqjgdk.exegavm.exedescription ioc process File created C:\Windows\Tasks\fjqjgdk.job 5b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792.exe File opened for modification C:\Windows\Tasks\fjqjgdk.job 5b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792.exe File created C:\Windows\Tasks\enebsiixbvaolfkrdqj.job fjqjgdk.exe File created C:\Windows\Tasks\prwfo.job gavm.exe File opened for modification C:\Windows\Tasks\prwfo.job gavm.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
5b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792.exegavm.exepid process 1576 5b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792.exe 1576 5b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792.exe 3880 gavm.exe 3880 gavm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792.exe"C:\Users\Admin\AppData\Local\Temp\5b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
C:\ProgramData\nbjn\fjqjgdk.exeC:\ProgramData\nbjn\fjqjgdk.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2468
-
C:\Windows\TEMP\gavm.exeC:\Windows\TEMP\gavm.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3880
-
C:\ProgramData\qaokiq\prwfo.exeC:\ProgramData\qaokiq\prwfo.exe start1⤵
- Executes dropped EXE
PID:3800
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
51f607442fbf580ed8292dfcdfa5737c
SHA1d34bbbae67b70c92791662b28e7518e0b72a7727
SHA2565b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792
SHA512282ccc2afcac56077aaace23ae8ad225ae464f7db2f22d9a37372f827ca5ea58289e5792ff32aba5909c82d93a6e751dba317694722c808d4e559cb5a43a1c8c
-
MD5
51f607442fbf580ed8292dfcdfa5737c
SHA1d34bbbae67b70c92791662b28e7518e0b72a7727
SHA2565b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792
SHA512282ccc2afcac56077aaace23ae8ad225ae464f7db2f22d9a37372f827ca5ea58289e5792ff32aba5909c82d93a6e751dba317694722c808d4e559cb5a43a1c8c
-
MD5
51f607442fbf580ed8292dfcdfa5737c
SHA1d34bbbae67b70c92791662b28e7518e0b72a7727
SHA2565b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792
SHA512282ccc2afcac56077aaace23ae8ad225ae464f7db2f22d9a37372f827ca5ea58289e5792ff32aba5909c82d93a6e751dba317694722c808d4e559cb5a43a1c8c
-
MD5
51f607442fbf580ed8292dfcdfa5737c
SHA1d34bbbae67b70c92791662b28e7518e0b72a7727
SHA2565b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792
SHA512282ccc2afcac56077aaace23ae8ad225ae464f7db2f22d9a37372f827ca5ea58289e5792ff32aba5909c82d93a6e751dba317694722c808d4e559cb5a43a1c8c
-
MD5
51f607442fbf580ed8292dfcdfa5737c
SHA1d34bbbae67b70c92791662b28e7518e0b72a7727
SHA2565b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792
SHA512282ccc2afcac56077aaace23ae8ad225ae464f7db2f22d9a37372f827ca5ea58289e5792ff32aba5909c82d93a6e751dba317694722c808d4e559cb5a43a1c8c
-
MD5
64da7efff025457403b16a629fe88076
SHA1a72aa1d784812353c2e392739fda81b80a7ba6b7
SHA256b1c1d63ad29c6e49d693f79e125749e1aaf6ed2582e481c9bfd049ef660babb7
SHA512ad11bde47df4000a8c9b44d38ecb2ad86ce5bf1e440dcb5d6471f6c2ca3a29c2f6888da7372b553f69849c79c275d3d778e5ccb57a45dee6347fcf87cde48656
-
MD5
51f607442fbf580ed8292dfcdfa5737c
SHA1d34bbbae67b70c92791662b28e7518e0b72a7727
SHA2565b3bfabc1a7a0ae3ffa378c4eea625cd4c77cbdc5cc9ed418f888af9be92f792
SHA512282ccc2afcac56077aaace23ae8ad225ae464f7db2f22d9a37372f827ca5ea58289e5792ff32aba5909c82d93a6e751dba317694722c808d4e559cb5a43a1c8c