Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10_x64 -
resource
win10-20220223-en -
submitted
28-03-2022 02:16
Static task
static1
General
-
Target
ccf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda.exe
-
Size
252KB
-
MD5
f9adf82323820ff0466e38db24769eb1
-
SHA1
b8e9af14c5546bf2a944f1a803cce1b725b67e57
-
SHA256
ccf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda
-
SHA512
1be76d81e8af31b4acfda7e5342798301ab0f086a760ed04b491fad253c342a57468f1470d163072300878a83aa415640477620d7de737c761637ab6cda547eb
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
wwcne.exeauddixx.exesidh.exepid process 3900 wwcne.exe 1380 auddixx.exe 3792 sidh.exe -
Drops file in Windows directory 5 IoCs
Processes:
auddixx.execcf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda.exewwcne.exedescription ioc process File created C:\Windows\Tasks\sidh.job auddixx.exe File opened for modification C:\Windows\Tasks\sidh.job auddixx.exe File created C:\Windows\Tasks\wwcne.job ccf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda.exe File opened for modification C:\Windows\Tasks\wwcne.job ccf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda.exe File created C:\Windows\Tasks\cvrecrggttiigvkkxxm.job wwcne.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
ccf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda.exeauddixx.exepid process 4012 ccf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda.exe 4012 ccf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda.exe 1380 auddixx.exe 1380 auddixx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda.exe"C:\Users\Admin\AppData\Local\Temp\ccf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
C:\ProgramData\nrtfpvh\wwcne.exeC:\ProgramData\nrtfpvh\wwcne.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3900
-
C:\Windows\TEMP\auddixx.exeC:\Windows\TEMP\auddixx.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
C:\ProgramData\cxplvql\sidh.exeC:\ProgramData\cxplvql\sidh.exe start1⤵
- Executes dropped EXE
PID:3792
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5f9adf82323820ff0466e38db24769eb1
SHA1b8e9af14c5546bf2a944f1a803cce1b725b67e57
SHA256ccf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda
SHA5121be76d81e8af31b4acfda7e5342798301ab0f086a760ed04b491fad253c342a57468f1470d163072300878a83aa415640477620d7de737c761637ab6cda547eb
-
Filesize
252KB
MD5f9adf82323820ff0466e38db24769eb1
SHA1b8e9af14c5546bf2a944f1a803cce1b725b67e57
SHA256ccf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda
SHA5121be76d81e8af31b4acfda7e5342798301ab0f086a760ed04b491fad253c342a57468f1470d163072300878a83aa415640477620d7de737c761637ab6cda547eb
-
Filesize
252KB
MD5f9adf82323820ff0466e38db24769eb1
SHA1b8e9af14c5546bf2a944f1a803cce1b725b67e57
SHA256ccf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda
SHA5121be76d81e8af31b4acfda7e5342798301ab0f086a760ed04b491fad253c342a57468f1470d163072300878a83aa415640477620d7de737c761637ab6cda547eb
-
Filesize
252KB
MD5f9adf82323820ff0466e38db24769eb1
SHA1b8e9af14c5546bf2a944f1a803cce1b725b67e57
SHA256ccf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda
SHA5121be76d81e8af31b4acfda7e5342798301ab0f086a760ed04b491fad253c342a57468f1470d163072300878a83aa415640477620d7de737c761637ab6cda547eb
-
Filesize
252KB
MD5f9adf82323820ff0466e38db24769eb1
SHA1b8e9af14c5546bf2a944f1a803cce1b725b67e57
SHA256ccf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda
SHA5121be76d81e8af31b4acfda7e5342798301ab0f086a760ed04b491fad253c342a57468f1470d163072300878a83aa415640477620d7de737c761637ab6cda547eb
-
Filesize
250B
MD556a16ca00f238beefbf8f1cd9e6b3e9f
SHA176ecfc77418bdc9a1c9909a79fb7a9f015336ab2
SHA25677974c3ced3da67a03f1bb0ea3bc01362a3dfb65b281b8bbd2bdfa65e1ff43bd
SHA51232e4beddde3a6d9e5f644191e9b42ba6555ffb66ab0997d559537236dd7daa98733afca43f9db3d8d511758f4643a20fe4e71be6d65ead1a6193a63628d54099
-
Filesize
252KB
MD5f9adf82323820ff0466e38db24769eb1
SHA1b8e9af14c5546bf2a944f1a803cce1b725b67e57
SHA256ccf5024d721389d85047dde2144af0ca66cef5d3e1d2dc92f0481cba06566eda
SHA5121be76d81e8af31b4acfda7e5342798301ab0f086a760ed04b491fad253c342a57468f1470d163072300878a83aa415640477620d7de737c761637ab6cda547eb