Analysis
-
max time kernel
4294188s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
28-03-2022 07:29
Static task
static1
Behavioral task
behavioral1
Sample
142939679afaeaf6cf66d3b80ea7d63e.exe
Resource
win7-20220311-en
General
-
Target
142939679afaeaf6cf66d3b80ea7d63e.exe
-
Size
255KB
-
MD5
142939679afaeaf6cf66d3b80ea7d63e
-
SHA1
149465fd8b48f262bcf361047bb8035b5b1f33a2
-
SHA256
64efd694a2e536ed7265fb46da5198788d895a9b7b9c2434404209b61c143a5f
-
SHA512
bed423909f581415e80bf44960c5415f2527eee02cfd39b6201c1d67831be1dbefe27d58b27e4118cfddbeee42251596fa1f6e8912d6b22143dd75cf455561b8
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
bbhmm.exepkinse.exegfffn.exepid process 768 bbhmm.exe 1200 pkinse.exe 1636 gfffn.exe -
Drops file in Windows directory 5 IoCs
Processes:
bbhmm.exepkinse.exe142939679afaeaf6cf66d3b80ea7d63e.exedescription ioc process File created C:\Windows\Tasks\qtuxqslevxbsuwactwa.job bbhmm.exe File created C:\Windows\Tasks\gfffn.job pkinse.exe File opened for modification C:\Windows\Tasks\gfffn.job pkinse.exe File created C:\Windows\Tasks\bbhmm.job 142939679afaeaf6cf66d3b80ea7d63e.exe File opened for modification C:\Windows\Tasks\bbhmm.job 142939679afaeaf6cf66d3b80ea7d63e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
142939679afaeaf6cf66d3b80ea7d63e.exepkinse.exepid process 1940 142939679afaeaf6cf66d3b80ea7d63e.exe 1200 pkinse.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
taskeng.exedescription pid process target process PID 520 wrote to memory of 768 520 taskeng.exe bbhmm.exe PID 520 wrote to memory of 768 520 taskeng.exe bbhmm.exe PID 520 wrote to memory of 768 520 taskeng.exe bbhmm.exe PID 520 wrote to memory of 768 520 taskeng.exe bbhmm.exe PID 520 wrote to memory of 1200 520 taskeng.exe pkinse.exe PID 520 wrote to memory of 1200 520 taskeng.exe pkinse.exe PID 520 wrote to memory of 1200 520 taskeng.exe pkinse.exe PID 520 wrote to memory of 1200 520 taskeng.exe pkinse.exe PID 520 wrote to memory of 1636 520 taskeng.exe gfffn.exe PID 520 wrote to memory of 1636 520 taskeng.exe gfffn.exe PID 520 wrote to memory of 1636 520 taskeng.exe gfffn.exe PID 520 wrote to memory of 1636 520 taskeng.exe gfffn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\142939679afaeaf6cf66d3b80ea7d63e.exe"C:\Users\Admin\AppData\Local\Temp\142939679afaeaf6cf66d3b80ea7d63e.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
C:\Windows\system32\taskeng.exetaskeng.exe {7357C892-BAF1-4B95-9B91-3BDA789CAB00} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\ProgramData\reetf\bbhmm.exeC:\ProgramData\reetf\bbhmm.exe start2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:768
-
-
C:\Windows\TEMP\pkinse.exeC:\Windows\TEMP\pkinse.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
C:\ProgramData\xkmmo\gfffn.exeC:\ProgramData\xkmmo\gfffn.exe start2⤵
- Executes dropped EXE
PID:1636
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5142939679afaeaf6cf66d3b80ea7d63e
SHA1149465fd8b48f262bcf361047bb8035b5b1f33a2
SHA25664efd694a2e536ed7265fb46da5198788d895a9b7b9c2434404209b61c143a5f
SHA512bed423909f581415e80bf44960c5415f2527eee02cfd39b6201c1d67831be1dbefe27d58b27e4118cfddbeee42251596fa1f6e8912d6b22143dd75cf455561b8
-
Filesize
255KB
MD5142939679afaeaf6cf66d3b80ea7d63e
SHA1149465fd8b48f262bcf361047bb8035b5b1f33a2
SHA25664efd694a2e536ed7265fb46da5198788d895a9b7b9c2434404209b61c143a5f
SHA512bed423909f581415e80bf44960c5415f2527eee02cfd39b6201c1d67831be1dbefe27d58b27e4118cfddbeee42251596fa1f6e8912d6b22143dd75cf455561b8
-
Filesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
-
Filesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
-
Filesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
-
Filesize
228B
MD51b41940e92ae6c4e56318b3a77047b81
SHA13c6f8362f270c9806cf0905d7ecb13a083558994
SHA256afd9e8e5f2c487f6efe92b1e3e549b63b4193237deaabafb9ff805a55fd75c19
SHA512baa0f7715b5303d8d83e518a1e2f5c9e2a3e17f5f097e07053e3b6c305cd4956042545bb353ecf2b976021965c4fb9ab912768c3e397777fe34b71fc05923173
-
Filesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414