Analysis
-
max time kernel
128s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
28-03-2022 08:19
Static task
static1
General
-
Target
ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97.exe
-
Size
252KB
-
MD5
61a1f58f5cbd7f4ca0bbd4d60435a376
-
SHA1
ce00e1a8efae69ba71cee648ad5a6a26ed51a43f
-
SHA256
ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97
-
SHA512
ebff9997e9a9f9916b9ce67725e428abe4eb6f6bc6b866b84f8b53954c9dd94393c5e84a930371b40d4ca7fd1fc1e6a04d242bf45be670de46e22760af29b447
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
peuxxk.exeebub.exetkogetr.exepid process 4172 peuxxk.exe 2988 ebub.exe 4596 tkogetr.exe -
Drops file in Windows directory 5 IoCs
Processes:
ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97.exepeuxxk.exeebub.exedescription ioc process File opened for modification C:\Windows\Tasks\peuxxk.job ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97.exe File created C:\Windows\Tasks\iwlliumaqjvnfwkcslx.job peuxxk.exe File created C:\Windows\Tasks\tkogetr.job ebub.exe File opened for modification C:\Windows\Tasks\tkogetr.job ebub.exe File created C:\Windows\Tasks\peuxxk.job ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1784 3592 WerFault.exe ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97.exeebub.exepid process 3592 ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97.exe 3592 ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97.exe 2988 ebub.exe 2988 ebub.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97.exe"C:\Users\Admin\AppData\Local\Temp\ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 9482⤵
- Program crash
PID:1784
-
-
C:\ProgramData\fdkn\peuxxk.exeC:\ProgramData\fdkn\peuxxk.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3592 -ip 35921⤵PID:5072
-
C:\Windows\TEMP\ebub.exeC:\Windows\TEMP\ebub.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
C:\ProgramData\wvsn\tkogetr.exeC:\ProgramData\wvsn\tkogetr.exe start1⤵
- Executes dropped EXE
PID:4596
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD561a1f58f5cbd7f4ca0bbd4d60435a376
SHA1ce00e1a8efae69ba71cee648ad5a6a26ed51a43f
SHA256ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97
SHA512ebff9997e9a9f9916b9ce67725e428abe4eb6f6bc6b866b84f8b53954c9dd94393c5e84a930371b40d4ca7fd1fc1e6a04d242bf45be670de46e22760af29b447
-
Filesize
252KB
MD561a1f58f5cbd7f4ca0bbd4d60435a376
SHA1ce00e1a8efae69ba71cee648ad5a6a26ed51a43f
SHA256ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97
SHA512ebff9997e9a9f9916b9ce67725e428abe4eb6f6bc6b866b84f8b53954c9dd94393c5e84a930371b40d4ca7fd1fc1e6a04d242bf45be670de46e22760af29b447
-
Filesize
252KB
MD561a1f58f5cbd7f4ca0bbd4d60435a376
SHA1ce00e1a8efae69ba71cee648ad5a6a26ed51a43f
SHA256ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97
SHA512ebff9997e9a9f9916b9ce67725e428abe4eb6f6bc6b866b84f8b53954c9dd94393c5e84a930371b40d4ca7fd1fc1e6a04d242bf45be670de46e22760af29b447
-
Filesize
252KB
MD561a1f58f5cbd7f4ca0bbd4d60435a376
SHA1ce00e1a8efae69ba71cee648ad5a6a26ed51a43f
SHA256ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97
SHA512ebff9997e9a9f9916b9ce67725e428abe4eb6f6bc6b866b84f8b53954c9dd94393c5e84a930371b40d4ca7fd1fc1e6a04d242bf45be670de46e22760af29b447
-
Filesize
252KB
MD561a1f58f5cbd7f4ca0bbd4d60435a376
SHA1ce00e1a8efae69ba71cee648ad5a6a26ed51a43f
SHA256ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97
SHA512ebff9997e9a9f9916b9ce67725e428abe4eb6f6bc6b866b84f8b53954c9dd94393c5e84a930371b40d4ca7fd1fc1e6a04d242bf45be670de46e22760af29b447
-
Filesize
246B
MD5392a3fecada61c7823e44cb44c8da5fd
SHA1681fa7b51ff5c52c5fecbb1f24c95e6470887cc4
SHA256b44a5681903503f176914b14ae4c5356c1cad98e2faec18f3478fe907ac7bf9a
SHA512962e24b296474409e9d1845b4b68b092e66c2dc3cedc53731d64613107f9031b612eb5bdaee41a5ee41d64cd6727860761eeb4342f1f725d5e9066c2b4df8162
-
Filesize
252KB
MD561a1f58f5cbd7f4ca0bbd4d60435a376
SHA1ce00e1a8efae69ba71cee648ad5a6a26ed51a43f
SHA256ed0acb83931bb187cd2f499b5bb3cdfae3530319ad51c968e57b3506a885ba97
SHA512ebff9997e9a9f9916b9ce67725e428abe4eb6f6bc6b866b84f8b53954c9dd94393c5e84a930371b40d4ca7fd1fc1e6a04d242bf45be670de46e22760af29b447