Analysis
-
max time kernel
156s -
max time network
159s -
platform
windows10_x64 -
resource
win10-20220223-en -
submitted
27-03-2022 19:46
Static task
static1
General
-
Target
080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f.exe
-
Size
272KB
-
MD5
b2010ae2cfef6f0553b00a0ec371ef86
-
SHA1
c83a32f4bada2d0faf80a661db17e38539ea29fa
-
SHA256
080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f
-
SHA512
845c7c9b8a8afce3a0ef1179e500810d623e7aa5fa00ab5d54f2af9277622e58f469c108cceb39e9ed872b10f7e19832c30e5ab6aedb7aed510745fb0291e05b
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
rlfewpn.exeppcaca.exehejel.exepid process 3900 rlfewpn.exe 1512 ppcaca.exe 3792 hejel.exe -
Drops file in Windows directory 5 IoCs
Processes:
rlfewpn.exeppcaca.exe080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f.exedescription ioc process File created C:\Windows\Tasks\fhsdfhjprxvdfmouwac.job rlfewpn.exe File created C:\Windows\Tasks\hejel.job ppcaca.exe File opened for modification C:\Windows\Tasks\hejel.job ppcaca.exe File created C:\Windows\Tasks\rlfewpn.job 080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f.exe File opened for modification C:\Windows\Tasks\rlfewpn.job 080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f.exeppcaca.exepid process 4016 080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f.exe 4016 080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f.exe 1512 ppcaca.exe 1512 ppcaca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f.exe"C:\Users\Admin\AppData\Local\Temp\080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
C:\ProgramData\caaw\rlfewpn.exeC:\ProgramData\caaw\rlfewpn.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3900
-
C:\Windows\TEMP\ppcaca.exeC:\Windows\TEMP\ppcaca.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
C:\ProgramData\ellrfdh\hejel.exeC:\ProgramData\ellrfdh\hejel.exe start1⤵
- Executes dropped EXE
PID:3792
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\caaw\rlfewpn.exeFilesize
272KB
MD5b2010ae2cfef6f0553b00a0ec371ef86
SHA1c83a32f4bada2d0faf80a661db17e38539ea29fa
SHA256080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f
SHA512845c7c9b8a8afce3a0ef1179e500810d623e7aa5fa00ab5d54f2af9277622e58f469c108cceb39e9ed872b10f7e19832c30e5ab6aedb7aed510745fb0291e05b
-
C:\ProgramData\caaw\rlfewpn.exeFilesize
272KB
MD5b2010ae2cfef6f0553b00a0ec371ef86
SHA1c83a32f4bada2d0faf80a661db17e38539ea29fa
SHA256080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f
SHA512845c7c9b8a8afce3a0ef1179e500810d623e7aa5fa00ab5d54f2af9277622e58f469c108cceb39e9ed872b10f7e19832c30e5ab6aedb7aed510745fb0291e05b
-
C:\ProgramData\ellrfdh\hejel.exeFilesize
272KB
MD5b2010ae2cfef6f0553b00a0ec371ef86
SHA1c83a32f4bada2d0faf80a661db17e38539ea29fa
SHA256080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f
SHA512845c7c9b8a8afce3a0ef1179e500810d623e7aa5fa00ab5d54f2af9277622e58f469c108cceb39e9ed872b10f7e19832c30e5ab6aedb7aed510745fb0291e05b
-
C:\ProgramData\ellrfdh\hejel.exeFilesize
272KB
MD5b2010ae2cfef6f0553b00a0ec371ef86
SHA1c83a32f4bada2d0faf80a661db17e38539ea29fa
SHA256080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f
SHA512845c7c9b8a8afce3a0ef1179e500810d623e7aa5fa00ab5d54f2af9277622e58f469c108cceb39e9ed872b10f7e19832c30e5ab6aedb7aed510745fb0291e05b
-
C:\Windows\TEMP\ppcaca.exeFilesize
272KB
MD5b2010ae2cfef6f0553b00a0ec371ef86
SHA1c83a32f4bada2d0faf80a661db17e38539ea29fa
SHA256080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f
SHA512845c7c9b8a8afce3a0ef1179e500810d623e7aa5fa00ab5d54f2af9277622e58f469c108cceb39e9ed872b10f7e19832c30e5ab6aedb7aed510745fb0291e05b
-
C:\Windows\Tasks\rlfewpn.jobFilesize
248B
MD5f1c249448040e3b48c1ed151e16a9c95
SHA1132d32426c5b62106237e77b3e1e9b4b31c321ce
SHA256359e5102abbb1c0bd5e130dc46002566a1caec3adb8606fc34e436d54d9057ec
SHA51240bdd5013835cf0579ec5a58472d1193b5fd480f4473c47316e8b93c78bb6bbd408a2dc1c138ba95a2d208df5657c047539cff0ffdad16a49a51ade16ec74dcd
-
C:\Windows\Temp\ppcaca.exeFilesize
272KB
MD5b2010ae2cfef6f0553b00a0ec371ef86
SHA1c83a32f4bada2d0faf80a661db17e38539ea29fa
SHA256080531b53daabd584297b11f5bccb8fbe86854e2cb8333415c0338b1493f450f
SHA512845c7c9b8a8afce3a0ef1179e500810d623e7aa5fa00ab5d54f2af9277622e58f469c108cceb39e9ed872b10f7e19832c30e5ab6aedb7aed510745fb0291e05b
-
memory/1512-126-0x00000000007D2000-0x00000000007DB000-memory.dmpFilesize
36KB
-
memory/1512-128-0x00000000007D2000-0x00000000007DB000-memory.dmpFilesize
36KB
-
memory/1512-129-0x0000000000490000-0x00000000005DA000-memory.dmpFilesize
1.3MB
-
memory/1512-130-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/3900-121-0x0000000000752000-0x000000000075B000-memory.dmpFilesize
36KB
-
memory/3900-122-0x0000000000490000-0x00000000005DA000-memory.dmpFilesize
1.3MB
-
memory/3900-123-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/3900-120-0x0000000000752000-0x000000000075B000-memory.dmpFilesize
36KB
-
memory/4016-115-0x0000000000530000-0x000000000067A000-memory.dmpFilesize
1.3MB
-
memory/4016-117-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/4016-116-0x00000000004E0000-0x00000000004E9000-memory.dmpFilesize
36KB