Analysis
-
max time kernel
4294196s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
27-03-2022 17:15
Static task
static1
Behavioral task
behavioral1
Sample
503506554b1cfa84d2301e262beeb1f2.exe
Resource
win7-20220311-en
General
-
Target
503506554b1cfa84d2301e262beeb1f2.exe
-
Size
223KB
-
MD5
503506554b1cfa84d2301e262beeb1f2
-
SHA1
7e6ce1ed06bd5962fdde1bebda495d9ecc9b72a9
-
SHA256
1e31a6de957adb7a23e155ef8e9f80e67dc763443053e0014fba9e91f4eebc6f
-
SHA512
bf0d9dd29b62a7ec306349a25e0eae234f060a00c81bb16bee04217c9254e66b5de6a9d0b908c8e3fca696b70350066a1e03d6cb0d9250456d005d58b23ddb01
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
txiqruv.exerphui.exekrbia.exepid process 1476 txiqruv.exe 1164 rphui.exe 1000 krbia.exe -
Drops file in Windows directory 5 IoCs
Processes:
503506554b1cfa84d2301e262beeb1f2.exetxiqruv.exerphui.exedescription ioc process File opened for modification C:\Windows\Tasks\txiqruv.job 503506554b1cfa84d2301e262beeb1f2.exe File created C:\Windows\Tasks\osxucagdjgmkqntqwuc.job txiqruv.exe File created C:\Windows\Tasks\krbia.job rphui.exe File opened for modification C:\Windows\Tasks\krbia.job rphui.exe File created C:\Windows\Tasks\txiqruv.job 503506554b1cfa84d2301e262beeb1f2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
503506554b1cfa84d2301e262beeb1f2.exerphui.exepid process 2032 503506554b1cfa84d2301e262beeb1f2.exe 1164 rphui.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
taskeng.exedescription pid process target process PID 1684 wrote to memory of 1476 1684 taskeng.exe txiqruv.exe PID 1684 wrote to memory of 1476 1684 taskeng.exe txiqruv.exe PID 1684 wrote to memory of 1476 1684 taskeng.exe txiqruv.exe PID 1684 wrote to memory of 1476 1684 taskeng.exe txiqruv.exe PID 1684 wrote to memory of 1164 1684 taskeng.exe rphui.exe PID 1684 wrote to memory of 1164 1684 taskeng.exe rphui.exe PID 1684 wrote to memory of 1164 1684 taskeng.exe rphui.exe PID 1684 wrote to memory of 1164 1684 taskeng.exe rphui.exe PID 1684 wrote to memory of 1000 1684 taskeng.exe krbia.exe PID 1684 wrote to memory of 1000 1684 taskeng.exe krbia.exe PID 1684 wrote to memory of 1000 1684 taskeng.exe krbia.exe PID 1684 wrote to memory of 1000 1684 taskeng.exe krbia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\503506554b1cfa84d2301e262beeb1f2.exe"C:\Users\Admin\AppData\Local\Temp\503506554b1cfa84d2301e262beeb1f2.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
C:\Windows\system32\taskeng.exetaskeng.exe {46E1E8B5-8370-4619-BA45-C1D0FACE4711} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\ProgramData\dtcjqx\txiqruv.exeC:\ProgramData\dtcjqx\txiqruv.exe start2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1476
-
-
C:\Windows\TEMP\rphui.exeC:\Windows\TEMP\rphui.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\ProgramData\eqbslpr\krbia.exeC:\ProgramData\eqbslpr\krbia.exe start2⤵
- Executes dropped EXE
PID:1000
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD5503506554b1cfa84d2301e262beeb1f2
SHA17e6ce1ed06bd5962fdde1bebda495d9ecc9b72a9
SHA2561e31a6de957adb7a23e155ef8e9f80e67dc763443053e0014fba9e91f4eebc6f
SHA512bf0d9dd29b62a7ec306349a25e0eae234f060a00c81bb16bee04217c9254e66b5de6a9d0b908c8e3fca696b70350066a1e03d6cb0d9250456d005d58b23ddb01
-
Filesize
223KB
MD5503506554b1cfa84d2301e262beeb1f2
SHA17e6ce1ed06bd5962fdde1bebda495d9ecc9b72a9
SHA2561e31a6de957adb7a23e155ef8e9f80e67dc763443053e0014fba9e91f4eebc6f
SHA512bf0d9dd29b62a7ec306349a25e0eae234f060a00c81bb16bee04217c9254e66b5de6a9d0b908c8e3fca696b70350066a1e03d6cb0d9250456d005d58b23ddb01
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff
-
Filesize
234B
MD50d2a324ca6d9821fc312a747890bc4d5
SHA1b1fec3158cec8469e403a5a58469a5a7124a8f62
SHA256c1f2e926633481e0a77759f8ddb78372fcb874880c4b87f2e08b94843bcbfbc3
SHA5126aad6a079115cefccae078f8cd717415d914edb7a78308dfbcd69561858ec2865ae23f4e06705c4f81533d168e92074d4f56cc2605dfb5713d1886769afc5be1
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff