Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
27-03-2022 17:15
Static task
static1
Behavioral task
behavioral1
Sample
503506554b1cfa84d2301e262beeb1f2.exe
Resource
win7-20220311-en
General
-
Target
503506554b1cfa84d2301e262beeb1f2.exe
-
Size
223KB
-
MD5
503506554b1cfa84d2301e262beeb1f2
-
SHA1
7e6ce1ed06bd5962fdde1bebda495d9ecc9b72a9
-
SHA256
1e31a6de957adb7a23e155ef8e9f80e67dc763443053e0014fba9e91f4eebc6f
-
SHA512
bf0d9dd29b62a7ec306349a25e0eae234f060a00c81bb16bee04217c9254e66b5de6a9d0b908c8e3fca696b70350066a1e03d6cb0d9250456d005d58b23ddb01
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
niwlbbp.exewxlkwvk.exewbteic.exepid process 1824 niwlbbp.exe 940 wxlkwvk.exe 5016 wbteic.exe -
Drops file in Windows directory 5 IoCs
Processes:
wxlkwvk.exe503506554b1cfa84d2301e262beeb1f2.exeniwlbbp.exedescription ioc process File opened for modification C:\Windows\Tasks\wbteic.job wxlkwvk.exe File created C:\Windows\Tasks\niwlbbp.job 503506554b1cfa84d2301e262beeb1f2.exe File opened for modification C:\Windows\Tasks\niwlbbp.job 503506554b1cfa84d2301e262beeb1f2.exe File created C:\Windows\Tasks\biumbdksgivemockwti.job niwlbbp.exe File created C:\Windows\Tasks\wbteic.job wxlkwvk.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4184 628 WerFault.exe 503506554b1cfa84d2301e262beeb1f2.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
503506554b1cfa84d2301e262beeb1f2.exewxlkwvk.exepid process 628 503506554b1cfa84d2301e262beeb1f2.exe 628 503506554b1cfa84d2301e262beeb1f2.exe 940 wxlkwvk.exe 940 wxlkwvk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\503506554b1cfa84d2301e262beeb1f2.exe"C:\Users\Admin\AppData\Local\Temp\503506554b1cfa84d2301e262beeb1f2.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 9482⤵
- Program crash
PID:4184
-
-
C:\ProgramData\tpufupa\niwlbbp.exeC:\ProgramData\tpufupa\niwlbbp.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 628 -ip 6281⤵PID:2284
-
C:\Windows\TEMP\wxlkwvk.exeC:\Windows\TEMP\wxlkwvk.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:940
-
C:\ProgramData\xpggw\wbteic.exeC:\ProgramData\xpggw\wbteic.exe start1⤵
- Executes dropped EXE
PID:5016
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD5503506554b1cfa84d2301e262beeb1f2
SHA17e6ce1ed06bd5962fdde1bebda495d9ecc9b72a9
SHA2561e31a6de957adb7a23e155ef8e9f80e67dc763443053e0014fba9e91f4eebc6f
SHA512bf0d9dd29b62a7ec306349a25e0eae234f060a00c81bb16bee04217c9254e66b5de6a9d0b908c8e3fca696b70350066a1e03d6cb0d9250456d005d58b23ddb01
-
Filesize
223KB
MD5503506554b1cfa84d2301e262beeb1f2
SHA17e6ce1ed06bd5962fdde1bebda495d9ecc9b72a9
SHA2561e31a6de957adb7a23e155ef8e9f80e67dc763443053e0014fba9e91f4eebc6f
SHA512bf0d9dd29b62a7ec306349a25e0eae234f060a00c81bb16bee04217c9254e66b5de6a9d0b908c8e3fca696b70350066a1e03d6cb0d9250456d005d58b23ddb01
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff
-
Filesize
254B
MD52b55f8155001973d08f4922e166679bd
SHA11a3e99597604cc36e9595671b4f1e9ba132c015d
SHA25679f1c9d8970ddcf8ac132edcea64fa76cf632e64e4266f610bf19aff076707de
SHA512c4f7192f13d9cc0eee5b18154593432e2fc1c12f4502c10e20f68aa26ca75f48076d2d3cdccd44c3f6f0a23b2570e20b39c8654ed1992002d326f1ee6b34b551
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff