Analysis
-
max time kernel
4294180s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
28-03-2022 07:40
Static task
static1
Behavioral task
behavioral1
Sample
0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe
Resource
win7-20220311-en
General
-
Target
0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe
-
Size
253KB
-
MD5
5366cfb7213ba42e13f5a07ba83a6353
-
SHA1
958421f6fe7a2928578157c36b366578bc4e1b18
-
SHA256
0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
-
SHA512
c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ewmlo.exepid process 1312 ewmlo.exe -
Drops file in Windows directory 2 IoCs
Processes:
0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exedescription ioc process File created C:\Windows\Tasks\ewmlo.job 0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe File opened for modification C:\Windows\Tasks\ewmlo.job 0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exepid process 588 0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 2016 wrote to memory of 1312 2016 taskeng.exe ewmlo.exe PID 2016 wrote to memory of 1312 2016 taskeng.exe ewmlo.exe PID 2016 wrote to memory of 1312 2016 taskeng.exe ewmlo.exe PID 2016 wrote to memory of 1312 2016 taskeng.exe ewmlo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe"C:\Users\Admin\AppData\Local\Temp\0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:588
-
C:\Windows\system32\taskeng.exetaskeng.exe {BC1F736D-6D92-4395-9F1C-6785346A1804} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\ProgramData\cskjxfl\ewmlo.exeC:\ProgramData\cskjxfl\ewmlo.exe start2⤵
- Executes dropped EXE
PID:1312
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
-
Filesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414