Analysis
-
max time kernel
149s -
max time network
188s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
28-03-2022 03:54
Static task
static1
Behavioral task
behavioral1
Sample
7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478.exe
Resource
win7-20220331-en
General
-
Target
7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478.exe
-
Size
308KB
-
MD5
1316e7d18ac7d4f2b00115ce31b7cc32
-
SHA1
8012ac64c5bbd3e0c93bcc9f3aa4d72dad4acd26
-
SHA256
7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478
-
SHA512
315c117c212e8a764db4f9c233052dfa826df25faee603e82c5beb744ad15ea6eabb6703b497675dcdf752993481ce4a36fbd2d8730b36bf2a125b243bf5c4c2
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
-
Executes dropped EXE 1 IoCs
Processes:
auhnqv.exepid process 1288 auhnqv.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 ip4.seeip.org 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478.exedescription ioc process File created C:\Windows\Tasks\auhnqv.job 7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478.exe File opened for modification C:\Windows\Tasks\auhnqv.job 7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478.exepid process 1960 7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1972 wrote to memory of 1288 1972 taskeng.exe auhnqv.exe PID 1972 wrote to memory of 1288 1972 taskeng.exe auhnqv.exe PID 1972 wrote to memory of 1288 1972 taskeng.exe auhnqv.exe PID 1972 wrote to memory of 1288 1972 taskeng.exe auhnqv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478.exe"C:\Users\Admin\AppData\Local\Temp\7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
C:\Windows\system32\taskeng.exetaskeng.exe {11F752C9-D602-41D0-BC11-82A84DBC1569} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\ProgramData\ovesn\auhnqv.exeC:\ProgramData\ovesn\auhnqv.exe start2⤵
- Executes dropped EXE
PID:1288
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD51316e7d18ac7d4f2b00115ce31b7cc32
SHA18012ac64c5bbd3e0c93bcc9f3aa4d72dad4acd26
SHA2567180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478
SHA512315c117c212e8a764db4f9c233052dfa826df25faee603e82c5beb744ad15ea6eabb6703b497675dcdf752993481ce4a36fbd2d8730b36bf2a125b243bf5c4c2
-
Filesize
308KB
MD51316e7d18ac7d4f2b00115ce31b7cc32
SHA18012ac64c5bbd3e0c93bcc9f3aa4d72dad4acd26
SHA2567180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478
SHA512315c117c212e8a764db4f9c233052dfa826df25faee603e82c5beb744ad15ea6eabb6703b497675dcdf752993481ce4a36fbd2d8730b36bf2a125b243bf5c4c2