Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
27-03-2022 17:15
Static task
static1
Behavioral task
behavioral1
Sample
66b2d7c88954a2afe07b15d0f6093c25.exe
Resource
win7-20220311-en
General
-
Target
66b2d7c88954a2afe07b15d0f6093c25.exe
-
Size
229KB
-
MD5
66b2d7c88954a2afe07b15d0f6093c25
-
SHA1
1d0b138eaedea0562284741f3028e3adbf3a2f79
-
SHA256
142d21e1c1d4b09bd1853f009c1e4bae0e3f4dcff9f9fe8d55e4cc5456d20971
-
SHA512
45821a86e252d2a666b0540eec27a7212c87be5d0146d0e0e39a85b36ac297f08bef7a7defd64a6fa4e98754f829ae95a928e6cc480ab07051dfe4651b1fd061
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
vksrjr.exefnmk.exenqohact.exepid process 1720 vksrjr.exe 4628 fnmk.exe 3768 nqohact.exe -
Drops file in Windows directory 5 IoCs
Processes:
66b2d7c88954a2afe07b15d0f6093c25.exevksrjr.exefnmk.exedescription ioc process File created C:\Windows\Tasks\vksrjr.job 66b2d7c88954a2afe07b15d0f6093c25.exe File opened for modification C:\Windows\Tasks\vksrjr.job 66b2d7c88954a2afe07b15d0f6093c25.exe File created C:\Windows\Tasks\nedpcalsfpwaqsfmxfq.job vksrjr.exe File created C:\Windows\Tasks\nqohact.job fnmk.exe File opened for modification C:\Windows\Tasks\nqohact.job fnmk.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3936 384 WerFault.exe 66b2d7c88954a2afe07b15d0f6093c25.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
66b2d7c88954a2afe07b15d0f6093c25.exefnmk.exepid process 384 66b2d7c88954a2afe07b15d0f6093c25.exe 384 66b2d7c88954a2afe07b15d0f6093c25.exe 4628 fnmk.exe 4628 fnmk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\66b2d7c88954a2afe07b15d0f6093c25.exe"C:\Users\Admin\AppData\Local\Temp\66b2d7c88954a2afe07b15d0f6093c25.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 2442⤵
- Program crash
PID:3936
-
-
C:\ProgramData\bfnrps\vksrjr.exeC:\ProgramData\bfnrps\vksrjr.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 384 -ip 3841⤵PID:4712
-
C:\Windows\TEMP\fnmk.exeC:\Windows\TEMP\fnmk.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
C:\ProgramData\aeph\nqohact.exeC:\ProgramData\aeph\nqohact.exe start1⤵
- Executes dropped EXE
PID:3768
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff
-
Filesize
229KB
MD566b2d7c88954a2afe07b15d0f6093c25
SHA11d0b138eaedea0562284741f3028e3adbf3a2f79
SHA256142d21e1c1d4b09bd1853f009c1e4bae0e3f4dcff9f9fe8d55e4cc5456d20971
SHA51245821a86e252d2a666b0540eec27a7212c87be5d0146d0e0e39a85b36ac297f08bef7a7defd64a6fa4e98754f829ae95a928e6cc480ab07051dfe4651b1fd061
-
Filesize
229KB
MD566b2d7c88954a2afe07b15d0f6093c25
SHA11d0b138eaedea0562284741f3028e3adbf3a2f79
SHA256142d21e1c1d4b09bd1853f009c1e4bae0e3f4dcff9f9fe8d55e4cc5456d20971
SHA51245821a86e252d2a666b0540eec27a7212c87be5d0146d0e0e39a85b36ac297f08bef7a7defd64a6fa4e98754f829ae95a928e6cc480ab07051dfe4651b1fd061
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff
-
Filesize
250B
MD5683481ecc10b5e8bce92990dd8386ad5
SHA11afaf72d9ea2fa916b2bf768b128d10909e82329
SHA25670c7db41fa4754245badfe8f0ade3ca3d7ae0a1937ca25342deeec294fa78212
SHA5120d1ba9e5e912df685f2b104ad44d1b04addc354256cb6b6cdcefd408c16f6f754096aa6322d8394f95ac825a3973eed7cde5597f124e814b4bec5259327eb275
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff