Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
27-03-2022 23:16
Static task
static1
Behavioral task
behavioral1
Sample
d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe
Resource
win7-20220331-en
General
-
Target
d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe
-
Size
140KB
-
MD5
7200a81b9e2065e853734078a4402d03
-
SHA1
10164b6200c431f33595dff706fe6d2ab12323fb
-
SHA256
d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8
-
SHA512
e4e5b73d9b2831a750d9018383599b8fbde21d207596e9203e196143d05e0c2e32b7425d62c5f6bc27fc7e912659a394e29d5eab7c2d5e4f1e597f7d79c34529
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
lpbvaqe.exepid process 2920 lpbvaqe.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org 7 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exedescription ioc process File created C:\Windows\Tasks\lpbvaqe.job d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe File opened for modification C:\Windows\Tasks\lpbvaqe.job d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2264 2272 WerFault.exe d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exepid process 2272 d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe 2272 d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe"C:\Users\Admin\AppData\Local\Temp\d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 4922⤵
- Program crash
PID:2264
-
-
C:\ProgramData\pfarxfm\lpbvaqe.exeC:\ProgramData\pfarxfm\lpbvaqe.exe start1⤵
- Executes dropped EXE
PID:2920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2272 -ip 22721⤵PID:4956
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD57200a81b9e2065e853734078a4402d03
SHA110164b6200c431f33595dff706fe6d2ab12323fb
SHA256d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8
SHA512e4e5b73d9b2831a750d9018383599b8fbde21d207596e9203e196143d05e0c2e32b7425d62c5f6bc27fc7e912659a394e29d5eab7c2d5e4f1e597f7d79c34529
-
Filesize
140KB
MD57200a81b9e2065e853734078a4402d03
SHA110164b6200c431f33595dff706fe6d2ab12323fb
SHA256d5d72184ddca524ef2b1c074e50a90a6e241cc0be01f7e5625979a693a6ee1e8
SHA512e4e5b73d9b2831a750d9018383599b8fbde21d207596e9203e196143d05e0c2e32b7425d62c5f6bc27fc7e912659a394e29d5eab7c2d5e4f1e597f7d79c34529