Analysis
-
max time kernel
4294181s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
27-03-2022 17:15
Static task
static1
Behavioral task
behavioral1
Sample
b3f12e9d8014c04bd829bcff42b91186.exe
Resource
win7-20220311-en
General
-
Target
b3f12e9d8014c04bd829bcff42b91186.exe
-
Size
230KB
-
MD5
b3f12e9d8014c04bd829bcff42b91186
-
SHA1
e64f8b6f9092808e8049cbd9c2fe070736db2bcc
-
SHA256
00d563277c832ba6a0d12f7b32f5ba19aac623bfaaabc8837d47bd6e985cd555
-
SHA512
801a0ea4bdad8a1d249fb5001eff9424bc03832097a696b4a462e80146ac7d2aa7907bd50535af1c231c74271b7991e431a45d69da3914c7181e061891f90281
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
jvsovf.execofupgf.exesspdl.exepid process 1964 jvsovf.exe 1984 cofupgf.exe 1560 sspdl.exe -
Drops file in Windows directory 5 IoCs
Processes:
b3f12e9d8014c04bd829bcff42b91186.exejvsovf.execofupgf.exedescription ioc process File opened for modification C:\Windows\Tasks\jvsovf.job b3f12e9d8014c04bd829bcff42b91186.exe File created C:\Windows\Tasks\saxedqtmleruruncgxg.job jvsovf.exe File created C:\Windows\Tasks\sspdl.job cofupgf.exe File opened for modification C:\Windows\Tasks\sspdl.job cofupgf.exe File created C:\Windows\Tasks\jvsovf.job b3f12e9d8014c04bd829bcff42b91186.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b3f12e9d8014c04bd829bcff42b91186.execofupgf.exepid process 1924 b3f12e9d8014c04bd829bcff42b91186.exe 1984 cofupgf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
taskeng.exedescription pid process target process PID 588 wrote to memory of 1964 588 taskeng.exe jvsovf.exe PID 588 wrote to memory of 1964 588 taskeng.exe jvsovf.exe PID 588 wrote to memory of 1964 588 taskeng.exe jvsovf.exe PID 588 wrote to memory of 1964 588 taskeng.exe jvsovf.exe PID 588 wrote to memory of 1984 588 taskeng.exe cofupgf.exe PID 588 wrote to memory of 1984 588 taskeng.exe cofupgf.exe PID 588 wrote to memory of 1984 588 taskeng.exe cofupgf.exe PID 588 wrote to memory of 1984 588 taskeng.exe cofupgf.exe PID 588 wrote to memory of 1560 588 taskeng.exe sspdl.exe PID 588 wrote to memory of 1560 588 taskeng.exe sspdl.exe PID 588 wrote to memory of 1560 588 taskeng.exe sspdl.exe PID 588 wrote to memory of 1560 588 taskeng.exe sspdl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3f12e9d8014c04bd829bcff42b91186.exe"C:\Users\Admin\AppData\Local\Temp\b3f12e9d8014c04bd829bcff42b91186.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
C:\Windows\system32\taskeng.exetaskeng.exe {25533CB1-F866-4B18-B494-FF39F1269C18} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\ProgramData\kwogark\jvsovf.exeC:\ProgramData\kwogark\jvsovf.exe start2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1964
-
-
C:\Windows\TEMP\cofupgf.exeC:\Windows\TEMP\cofupgf.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\ProgramData\xvkij\sspdl.exeC:\ProgramData\xvkij\sspdl.exe start2⤵
- Executes dropped EXE
PID:1560
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD5b3f12e9d8014c04bd829bcff42b91186
SHA1e64f8b6f9092808e8049cbd9c2fe070736db2bcc
SHA25600d563277c832ba6a0d12f7b32f5ba19aac623bfaaabc8837d47bd6e985cd555
SHA512801a0ea4bdad8a1d249fb5001eff9424bc03832097a696b4a462e80146ac7d2aa7907bd50535af1c231c74271b7991e431a45d69da3914c7181e061891f90281
-
Filesize
230KB
MD5b3f12e9d8014c04bd829bcff42b91186
SHA1e64f8b6f9092808e8049cbd9c2fe070736db2bcc
SHA25600d563277c832ba6a0d12f7b32f5ba19aac623bfaaabc8837d47bd6e985cd555
SHA512801a0ea4bdad8a1d249fb5001eff9424bc03832097a696b4a462e80146ac7d2aa7907bd50535af1c231c74271b7991e431a45d69da3914c7181e061891f90281
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff
-
Filesize
234B
MD5361301c4d2f4e613b24f7a114a1c1752
SHA158adba76979246b7d18efbc3af4d6ca9967110ee
SHA25693717771a74c39eb593d1b7707390856059b104d90e95e8e4e678e055e17a3f6
SHA512abc16f8e3f72df66354972f7e99aeef9415b21d592cbf07d325c4a7e9cf1d02a99506b04c76a64662e48119a8b158359005eaa805302819aa67cf8d755e77945
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff