Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
28-03-2022 07:40
Static task
static1
Behavioral task
behavioral1
Sample
0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe
Resource
win7-20220311-en
General
-
Target
0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe
-
Size
253KB
-
MD5
5366cfb7213ba42e13f5a07ba83a6353
-
SHA1
958421f6fe7a2928578157c36b366578bc4e1b18
-
SHA256
0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
-
SHA512
c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
kpskidw.exelcqh.exeojufjh.exepid process 1376 kpskidw.exe 2824 lcqh.exe 3512 ojufjh.exe -
Drops file in Windows directory 5 IoCs
Processes:
0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exekpskidw.exelcqh.exedescription ioc process File created C:\Windows\Tasks\kpskidw.job 0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe File opened for modification C:\Windows\Tasks\kpskidw.job 0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe File created C:\Windows\Tasks\acpjjevpixriarketmc.job kpskidw.exe File created C:\Windows\Tasks\ojufjh.job lcqh.exe File opened for modification C:\Windows\Tasks\ojufjh.job lcqh.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1676 5116 WerFault.exe 0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exelcqh.exepid process 5116 0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe 5116 0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe 2824 lcqh.exe 2824 lcqh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe"C:\Users\Admin\AppData\Local\Temp\0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:5116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 4842⤵
- Program crash
PID:1676
-
-
C:\ProgramData\olouw\kpskidw.exeC:\ProgramData\olouw\kpskidw.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5116 -ip 51161⤵PID:3232
-
C:\Windows\TEMP\lcqh.exeC:\Windows\TEMP\lcqh.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
C:\ProgramData\nrdpion\ojufjh.exeC:\ProgramData\nrdpion\ojufjh.exe start1⤵
- Executes dropped EXE
PID:3512
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
-
Filesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
-
Filesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
-
Filesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
-
Filesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
-
Filesize
250B
MD5be724fcf1e2e25dd9f0c08e930b5e266
SHA15e9a3802937d2c3a945715be8955b876deda56bc
SHA256a607db028f94744b39eb6198caaed22d4e4ad3383e93f08f7b255e1ef0a00828
SHA512616c8e742dd21676d92c9615a1ccbf1f7050bb06ec84aa1cc7ab6e82fc7f86e3cb26d4449b8eabc6dc833d1bef6d20c9141524fb307259ce41366fae1f9ef559
-
Filesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414