Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10_x64 -
resource
win10-20220223-en -
submitted
27-03-2022 00:06
Static task
static1
General
-
Target
023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f.exe
-
Size
230KB
-
MD5
3cbe19c2cf88bfbc4eac2980aad96aa2
-
SHA1
3c94a02287f9307fe28a47770226098ce5081793
-
SHA256
023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f
-
SHA512
c04e79744650e128156533f8d06798090a24f4852c96bf6f3506350fc101cfc4f6fe6dc2c25ec62ec343c8dc544cf6bf47d5e8f1f5ad734cb69ca26e4c645458
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
xqbmm.execomtlx.exehpju.exepid process 3628 xqbmm.exe 1788 comtlx.exe 3988 hpju.exe -
Drops file in Windows directory 5 IoCs
Processes:
xqbmm.execomtlx.exe023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f.exedescription ioc process File created C:\Windows\Tasks\fnhrstghisbumopbcdn.job xqbmm.exe File created C:\Windows\Tasks\hpju.job comtlx.exe File opened for modification C:\Windows\Tasks\hpju.job comtlx.exe File created C:\Windows\Tasks\xqbmm.job 023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f.exe File opened for modification C:\Windows\Tasks\xqbmm.job 023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f.execomtlx.exepid process 1576 023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f.exe 1576 023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f.exe 1788 comtlx.exe 1788 comtlx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f.exe"C:\Users\Admin\AppData\Local\Temp\023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
C:\ProgramData\tivbom\xqbmm.exeC:\ProgramData\tivbom\xqbmm.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3628
-
C:\Windows\TEMP\comtlx.exeC:\Windows\TEMP\comtlx.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1788
-
C:\ProgramData\jcoedq\hpju.exeC:\ProgramData\jcoedq\hpju.exe start1⤵
- Executes dropped EXE
PID:3988
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3cbe19c2cf88bfbc4eac2980aad96aa2
SHA13c94a02287f9307fe28a47770226098ce5081793
SHA256023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f
SHA512c04e79744650e128156533f8d06798090a24f4852c96bf6f3506350fc101cfc4f6fe6dc2c25ec62ec343c8dc544cf6bf47d5e8f1f5ad734cb69ca26e4c645458
-
MD5
3cbe19c2cf88bfbc4eac2980aad96aa2
SHA13c94a02287f9307fe28a47770226098ce5081793
SHA256023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f
SHA512c04e79744650e128156533f8d06798090a24f4852c96bf6f3506350fc101cfc4f6fe6dc2c25ec62ec343c8dc544cf6bf47d5e8f1f5ad734cb69ca26e4c645458
-
MD5
3cbe19c2cf88bfbc4eac2980aad96aa2
SHA13c94a02287f9307fe28a47770226098ce5081793
SHA256023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f
SHA512c04e79744650e128156533f8d06798090a24f4852c96bf6f3506350fc101cfc4f6fe6dc2c25ec62ec343c8dc544cf6bf47d5e8f1f5ad734cb69ca26e4c645458
-
MD5
3cbe19c2cf88bfbc4eac2980aad96aa2
SHA13c94a02287f9307fe28a47770226098ce5081793
SHA256023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f
SHA512c04e79744650e128156533f8d06798090a24f4852c96bf6f3506350fc101cfc4f6fe6dc2c25ec62ec343c8dc544cf6bf47d5e8f1f5ad734cb69ca26e4c645458
-
MD5
3cbe19c2cf88bfbc4eac2980aad96aa2
SHA13c94a02287f9307fe28a47770226098ce5081793
SHA256023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f
SHA512c04e79744650e128156533f8d06798090a24f4852c96bf6f3506350fc101cfc4f6fe6dc2c25ec62ec343c8dc544cf6bf47d5e8f1f5ad734cb69ca26e4c645458
-
MD5
dab7ceb9fcd1c65245157904ce0144ef
SHA158683c6cf156d6f90d0433988a2fca9edd8fda3c
SHA2561f9f5268f31166c1449e7c452c7b647a8e0e3fc81f7e9eb4e94059f05f07bf98
SHA512c3501b4bb4827571cdbdb247624416fc544be6cb7fe0570f32a404a7a76c83431018b1adc6c8f90b64d2bad88f91f329cea6d6044259c167c9ff4e667dcd545e
-
MD5
3cbe19c2cf88bfbc4eac2980aad96aa2
SHA13c94a02287f9307fe28a47770226098ce5081793
SHA256023e0ac5b8ee582ac8d8c1f36b96c8a87263e360428b0003b3159c876604be5f
SHA512c04e79744650e128156533f8d06798090a24f4852c96bf6f3506350fc101cfc4f6fe6dc2c25ec62ec343c8dc544cf6bf47d5e8f1f5ad734cb69ca26e4c645458