Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
27-03-2022 23:16
Static task
static1
Behavioral task
behavioral1
Sample
d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe
Resource
win7-20220331-en
General
-
Target
d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe
-
Size
140KB
-
MD5
7200a81b9e2065e853734078a4402d03
-
SHA1
10164b6200c431f33595dff706fe6d2ab12323fb
-
SHA256
d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8
-
SHA512
e4e5b73d9b2831a750d9018383599b8fbde21d207596e9203e196143d05e0c2e32b7425d62c5f6bc27fc7e912659a394e29d5eab7c2d5e4f1e597f7d79c34529
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rknkwum.exepid process 1216 rknkwum.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ip4.seeip.org 8 ip4.seeip.org 5 api.ipify.org 6 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exedescription ioc process File opened for modification C:\Windows\Tasks\rknkwum.job d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe File created C:\Windows\Tasks\rknkwum.job d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exepid process 1616 d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 960 wrote to memory of 1216 960 taskeng.exe rknkwum.exe PID 960 wrote to memory of 1216 960 taskeng.exe rknkwum.exe PID 960 wrote to memory of 1216 960 taskeng.exe rknkwum.exe PID 960 wrote to memory of 1216 960 taskeng.exe rknkwum.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe"C:\Users\Admin\AppData\Local\Temp\d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
C:\Windows\system32\taskeng.exetaskeng.exe {D3D4CE93-E431-4387-85CA-71A0017C4584} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\ProgramData\gpkx\rknkwum.exeC:\ProgramData\gpkx\rknkwum.exe start2⤵
- Executes dropped EXE
PID:1216
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD57200a81b9e2065e853734078a4402d03
SHA110164b6200c431f33595dff706fe6d2ab12323fb
SHA256d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8
SHA512e4e5b73d9b2831a750d9018383599b8fbde21d207596e9203e196143d05e0c2e32b7425d62c5f6bc27fc7e912659a394e29d5eab7c2d5e4f1e597f7d79c34529
-
Filesize
140KB
MD57200a81b9e2065e853734078a4402d03
SHA110164b6200c431f33595dff706fe6d2ab12323fb
SHA256d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8
SHA512e4e5b73d9b2831a750d9018383599b8fbde21d207596e9203e196143d05e0c2e32b7425d62c5f6bc27fc7e912659a394e29d5eab7c2d5e4f1e597f7d79c34529