Analysis
-
max time kernel
4294199s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
27-03-2022 17:17
Static task
static1
Behavioral task
behavioral1
Sample
20e5ae4397a4ab132e7e8a5f316d08d3.exe
Resource
win7-20220310-en
General
-
Target
20e5ae4397a4ab132e7e8a5f316d08d3.exe
-
Size
231KB
-
MD5
20e5ae4397a4ab132e7e8a5f316d08d3
-
SHA1
f1a05d3426661dad12ea034ac9710c5842923df4
-
SHA256
b4286bce9138f9c8fff9f8fc2eb4dcda9d48af83c62cf5ea03de48f862b301d9
-
SHA512
5b8e49bcf0a1e40f0cde13c6f160e4008d993087bd087f320fd46fcb48d304d890c3e1e5e64b518c5466ab5536cef11dd6c5e0ba30d802e9f0da1d34bd3026fb
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
owxs.exersjx.exewctqmkw.exepid process 1776 owxs.exe 1612 rsjx.exe 1680 wctqmkw.exe -
Drops file in Windows directory 5 IoCs
Processes:
rsjx.exe20e5ae4397a4ab132e7e8a5f316d08d3.exeowxs.exedescription ioc process File created C:\Windows\Tasks\wctqmkw.job rsjx.exe File opened for modification C:\Windows\Tasks\wctqmkw.job rsjx.exe File created C:\Windows\Tasks\owxs.job 20e5ae4397a4ab132e7e8a5f316d08d3.exe File opened for modification C:\Windows\Tasks\owxs.job 20e5ae4397a4ab132e7e8a5f316d08d3.exe File created C:\Windows\Tasks\fdohwciqseuhvjltbbl.job owxs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
20e5ae4397a4ab132e7e8a5f316d08d3.exersjx.exepid process 1632 20e5ae4397a4ab132e7e8a5f316d08d3.exe 1612 rsjx.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
taskeng.exedescription pid process target process PID 792 wrote to memory of 1776 792 taskeng.exe owxs.exe PID 792 wrote to memory of 1776 792 taskeng.exe owxs.exe PID 792 wrote to memory of 1776 792 taskeng.exe owxs.exe PID 792 wrote to memory of 1776 792 taskeng.exe owxs.exe PID 792 wrote to memory of 1612 792 taskeng.exe rsjx.exe PID 792 wrote to memory of 1612 792 taskeng.exe rsjx.exe PID 792 wrote to memory of 1612 792 taskeng.exe rsjx.exe PID 792 wrote to memory of 1612 792 taskeng.exe rsjx.exe PID 792 wrote to memory of 1680 792 taskeng.exe wctqmkw.exe PID 792 wrote to memory of 1680 792 taskeng.exe wctqmkw.exe PID 792 wrote to memory of 1680 792 taskeng.exe wctqmkw.exe PID 792 wrote to memory of 1680 792 taskeng.exe wctqmkw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20e5ae4397a4ab132e7e8a5f316d08d3.exe"C:\Users\Admin\AppData\Local\Temp\20e5ae4397a4ab132e7e8a5f316d08d3.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
C:\Windows\system32\taskeng.exetaskeng.exe {32D602BF-40F8-43B2-B7E5-C6B67B361905} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:792 -
C:\ProgramData\jemae\owxs.exeC:\ProgramData\jemae\owxs.exe start2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1776
-
-
C:\Windows\TEMP\rsjx.exeC:\Windows\TEMP\rsjx.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\ProgramData\arsae\wctqmkw.exeC:\ProgramData\arsae\wctqmkw.exe start2⤵
- Executes dropped EXE
PID:1680
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff
-
Filesize
231KB
MD520e5ae4397a4ab132e7e8a5f316d08d3
SHA1f1a05d3426661dad12ea034ac9710c5842923df4
SHA256b4286bce9138f9c8fff9f8fc2eb4dcda9d48af83c62cf5ea03de48f862b301d9
SHA5125b8e49bcf0a1e40f0cde13c6f160e4008d993087bd087f320fd46fcb48d304d890c3e1e5e64b518c5466ab5536cef11dd6c5e0ba30d802e9f0da1d34bd3026fb
-
Filesize
231KB
MD520e5ae4397a4ab132e7e8a5f316d08d3
SHA1f1a05d3426661dad12ea034ac9710c5842923df4
SHA256b4286bce9138f9c8fff9f8fc2eb4dcda9d48af83c62cf5ea03de48f862b301d9
SHA5125b8e49bcf0a1e40f0cde13c6f160e4008d993087bd087f320fd46fcb48d304d890c3e1e5e64b518c5466ab5536cef11dd6c5e0ba30d802e9f0da1d34bd3026fb
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff
-
Filesize
226B
MD5d72229c978a5b7af90293a923b6abd3c
SHA13c948635d9f65edd952a205103b5ff82fe58545a
SHA2568d15cc532919d3919bede32bbdd213fd6b67ac888b7f6844afa2684dde94345e
SHA51284305c03fb68f3e6cf1f929b1471e6376e922713ff6cec04b4b62f7f43be9bf72f9be469caf958e42ee747f518dc5c96c83f80db70bf13fd470e3625584f17aa
-
Filesize
272KB
MD571ebd9fd8ea9fc4e67e52546cb45b35a
SHA14ce5c776e627a8b13c81b99bcf6cb4bcd7f8369a
SHA25691e432fb78409fd8fbdbc8783b3e53b0352b207c88519c8550d72237785334b6
SHA5125ad93d5047f68e349306d8361de4fcbc1e3694ee148c08877c5ead40d3814443ea168f715f256365fc6c73ab61aec59bd5329964d2083bf9c0a46d83e89924ff