Analysis
-
max time kernel
126s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
27-03-2022 12:06
Static task
static1
General
-
Target
adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929.exe
-
Size
273KB
-
MD5
d9a7e822d38ef4624cb6c6d6c058bc30
-
SHA1
3f48b9031f653d55eb5c53a8c99346b0d4f1bd52
-
SHA256
adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929
-
SHA512
3084f7c27a5b453b8def1c7e8fd0f68ddcc408e57207635192451b92d0885e9ef3fafbb6c20491359a4da8cb06b35b446c11d70fa1fe0185d92d963eed5e9c5f
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
bijn.exekbuxvr.exealss.exepid process 1200 bijn.exe 1268 kbuxvr.exe 4720 alss.exe -
Drops file in Windows directory 5 IoCs
Processes:
adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929.exebijn.exekbuxvr.exedescription ioc process File opened for modification C:\Windows\Tasks\bijn.job adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929.exe File created C:\Windows\Tasks\dkjvtumksxvdiwnomok.job bijn.exe File created C:\Windows\Tasks\alss.job kbuxvr.exe File opened for modification C:\Windows\Tasks\alss.job kbuxvr.exe File created C:\Windows\Tasks\bijn.job adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5004 3668 WerFault.exe adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929.exekbuxvr.exepid process 3668 adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929.exe 3668 adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929.exe 1268 kbuxvr.exe 1268 kbuxvr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929.exe"C:\Users\Admin\AppData\Local\Temp\adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 4842⤵
- Program crash
PID:5004
-
-
C:\ProgramData\xiqxgnu\bijn.exeC:\ProgramData\xiqxgnu\bijn.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3668 -ip 36681⤵PID:4164
-
C:\Windows\TEMP\kbuxvr.exeC:\Windows\TEMP\kbuxvr.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1268
-
C:\ProgramData\gvmpf\alss.exeC:\ProgramData\gvmpf\alss.exe start1⤵
- Executes dropped EXE
PID:4720
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
273KB
MD5d9a7e822d38ef4624cb6c6d6c058bc30
SHA13f48b9031f653d55eb5c53a8c99346b0d4f1bd52
SHA256adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929
SHA5123084f7c27a5b453b8def1c7e8fd0f68ddcc408e57207635192451b92d0885e9ef3fafbb6c20491359a4da8cb06b35b446c11d70fa1fe0185d92d963eed5e9c5f
-
Filesize
273KB
MD5d9a7e822d38ef4624cb6c6d6c058bc30
SHA13f48b9031f653d55eb5c53a8c99346b0d4f1bd52
SHA256adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929
SHA5123084f7c27a5b453b8def1c7e8fd0f68ddcc408e57207635192451b92d0885e9ef3fafbb6c20491359a4da8cb06b35b446c11d70fa1fe0185d92d963eed5e9c5f
-
Filesize
273KB
MD5d9a7e822d38ef4624cb6c6d6c058bc30
SHA13f48b9031f653d55eb5c53a8c99346b0d4f1bd52
SHA256adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929
SHA5123084f7c27a5b453b8def1c7e8fd0f68ddcc408e57207635192451b92d0885e9ef3fafbb6c20491359a4da8cb06b35b446c11d70fa1fe0185d92d963eed5e9c5f
-
Filesize
273KB
MD5d9a7e822d38ef4624cb6c6d6c058bc30
SHA13f48b9031f653d55eb5c53a8c99346b0d4f1bd52
SHA256adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929
SHA5123084f7c27a5b453b8def1c7e8fd0f68ddcc408e57207635192451b92d0885e9ef3fafbb6c20491359a4da8cb06b35b446c11d70fa1fe0185d92d963eed5e9c5f
-
Filesize
273KB
MD5d9a7e822d38ef4624cb6c6d6c058bc30
SHA13f48b9031f653d55eb5c53a8c99346b0d4f1bd52
SHA256adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929
SHA5123084f7c27a5b453b8def1c7e8fd0f68ddcc408e57207635192451b92d0885e9ef3fafbb6c20491359a4da8cb06b35b446c11d70fa1fe0185d92d963eed5e9c5f
-
Filesize
248B
MD5a3a10d72d3b3711aded27675cef09788
SHA1de42365e39becd76178004c74cc232a4bccd94ee
SHA256f7d72070873ae32852195b8f20bc2ab2c7933f58da1b850eaad51bb0e3e04a17
SHA5121b718ea465eb883326b949e895687efd706ec7d21ce8f5398e2713f0b63a141c05b2173ef63196d7ca5447f0ecd3b2019167a6c74c280413a77fdb8ec3797237
-
Filesize
273KB
MD5d9a7e822d38ef4624cb6c6d6c058bc30
SHA13f48b9031f653d55eb5c53a8c99346b0d4f1bd52
SHA256adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929
SHA5123084f7c27a5b453b8def1c7e8fd0f68ddcc408e57207635192451b92d0885e9ef3fafbb6c20491359a4da8cb06b35b446c11d70fa1fe0185d92d963eed5e9c5f