Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10_x64 -
resource
win10-20220310-en -
submitted
27-03-2022 04:10
Static task
static1
General
-
Target
1c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c.exe
-
Size
230KB
-
MD5
ab09bf44a4158a298817de928ca824ed
-
SHA1
017ecdbe9cf8aab6940ca6fd551971b2d4ba7de1
-
SHA256
1c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c
-
SHA512
1681ccdd0ddfffd4ebdaff5e2e98d67d00f249ae526ec29869cf3da924074d821baa5044f5e61559702b3dae14cffd2cb0e4ea0d528c7f9f648794dcdb060473
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
hokcxw.exepukgqsf.exeakrp.exepid process 2208 hokcxw.exe 3464 pukgqsf.exe 1256 akrp.exe -
Drops file in Windows directory 5 IoCs
Processes:
hokcxw.exepukgqsf.exe1c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c.exedescription ioc process File created C:\Windows\Tasks\cumrwsubtsxeafejurw.job hokcxw.exe File created C:\Windows\Tasks\akrp.job pukgqsf.exe File opened for modification C:\Windows\Tasks\akrp.job pukgqsf.exe File created C:\Windows\Tasks\hokcxw.job 1c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c.exe File opened for modification C:\Windows\Tasks\hokcxw.job 1c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
1c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c.exepukgqsf.exepid process 1840 1c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c.exe 1840 1c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c.exe 3464 pukgqsf.exe 3464 pukgqsf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c.exe"C:\Users\Admin\AppData\Local\Temp\1c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
C:\ProgramData\fcmjfc\hokcxw.exeC:\ProgramData\fcmjfc\hokcxw.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2208
-
C:\Windows\TEMP\pukgqsf.exeC:\Windows\TEMP\pukgqsf.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
C:\ProgramData\eludw\akrp.exeC:\ProgramData\eludw\akrp.exe start1⤵
- Executes dropped EXE
PID:1256
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ab09bf44a4158a298817de928ca824ed
SHA1017ecdbe9cf8aab6940ca6fd551971b2d4ba7de1
SHA2561c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c
SHA5121681ccdd0ddfffd4ebdaff5e2e98d67d00f249ae526ec29869cf3da924074d821baa5044f5e61559702b3dae14cffd2cb0e4ea0d528c7f9f648794dcdb060473
-
MD5
ab09bf44a4158a298817de928ca824ed
SHA1017ecdbe9cf8aab6940ca6fd551971b2d4ba7de1
SHA2561c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c
SHA5121681ccdd0ddfffd4ebdaff5e2e98d67d00f249ae526ec29869cf3da924074d821baa5044f5e61559702b3dae14cffd2cb0e4ea0d528c7f9f648794dcdb060473
-
MD5
ab09bf44a4158a298817de928ca824ed
SHA1017ecdbe9cf8aab6940ca6fd551971b2d4ba7de1
SHA2561c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c
SHA5121681ccdd0ddfffd4ebdaff5e2e98d67d00f249ae526ec29869cf3da924074d821baa5044f5e61559702b3dae14cffd2cb0e4ea0d528c7f9f648794dcdb060473
-
MD5
ab09bf44a4158a298817de928ca824ed
SHA1017ecdbe9cf8aab6940ca6fd551971b2d4ba7de1
SHA2561c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c
SHA5121681ccdd0ddfffd4ebdaff5e2e98d67d00f249ae526ec29869cf3da924074d821baa5044f5e61559702b3dae14cffd2cb0e4ea0d528c7f9f648794dcdb060473
-
MD5
ab09bf44a4158a298817de928ca824ed
SHA1017ecdbe9cf8aab6940ca6fd551971b2d4ba7de1
SHA2561c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c
SHA5121681ccdd0ddfffd4ebdaff5e2e98d67d00f249ae526ec29869cf3da924074d821baa5044f5e61559702b3dae14cffd2cb0e4ea0d528c7f9f648794dcdb060473
-
MD5
f5ea0d8a32bbf7f14bd82853d0cfd44b
SHA1c0e009dcf2754a6f8a3a5db590d5ec4ce449deac
SHA25611f9bec4aa7b9420a58871822bfe44c2311b4a3b9d542f0f7f551f92686b23e0
SHA512fba361b1731623259957644dcdad35493c9f6799d3c16eeaa118975a4a2ed336cad71ad577700a43ee0256ef18e720a8d7fcd7f31a9398f4023302b2e3a1a42f
-
MD5
ab09bf44a4158a298817de928ca824ed
SHA1017ecdbe9cf8aab6940ca6fd551971b2d4ba7de1
SHA2561c78364dfbd92a622c9b580de759242122e8996ad6490885428c5c86b2bcab5c
SHA5121681ccdd0ddfffd4ebdaff5e2e98d67d00f249ae526ec29869cf3da924074d821baa5044f5e61559702b3dae14cffd2cb0e4ea0d528c7f9f648794dcdb060473