Analysis
-
max time kernel
4294204s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
28-03-2022 07:58
Static task
static1
Behavioral task
behavioral1
Sample
5366cfb7213ba42e13f5a07ba83a6353.exe
Resource
win7-20220311-en
General
-
Target
5366cfb7213ba42e13f5a07ba83a6353.exe
-
Size
253KB
-
MD5
5366cfb7213ba42e13f5a07ba83a6353
-
SHA1
958421f6fe7a2928578157c36b366578bc4e1b18
-
SHA256
0f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
-
SHA512
c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
nfmfg.exemgowgtd.exefrbnnop.exepid process 1104 nfmfg.exe 548 mgowgtd.exe 296 frbnnop.exe -
Drops file in Windows directory 5 IoCs
Processes:
mgowgtd.exe5366cfb7213ba42e13f5a07ba83a6353.exenfmfg.exedescription ioc process File created C:\Windows\Tasks\frbnnop.job mgowgtd.exe File opened for modification C:\Windows\Tasks\frbnnop.job mgowgtd.exe File created C:\Windows\Tasks\nfmfg.job 5366cfb7213ba42e13f5a07ba83a6353.exe File opened for modification C:\Windows\Tasks\nfmfg.job 5366cfb7213ba42e13f5a07ba83a6353.exe File created C:\Windows\Tasks\ckxuivmfpkodgmxklwe.job nfmfg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
5366cfb7213ba42e13f5a07ba83a6353.exemgowgtd.exepid process 1792 5366cfb7213ba42e13f5a07ba83a6353.exe 548 mgowgtd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
taskeng.exedescription pid process target process PID 468 wrote to memory of 1104 468 taskeng.exe nfmfg.exe PID 468 wrote to memory of 1104 468 taskeng.exe nfmfg.exe PID 468 wrote to memory of 1104 468 taskeng.exe nfmfg.exe PID 468 wrote to memory of 1104 468 taskeng.exe nfmfg.exe PID 468 wrote to memory of 548 468 taskeng.exe mgowgtd.exe PID 468 wrote to memory of 548 468 taskeng.exe mgowgtd.exe PID 468 wrote to memory of 548 468 taskeng.exe mgowgtd.exe PID 468 wrote to memory of 548 468 taskeng.exe mgowgtd.exe PID 468 wrote to memory of 296 468 taskeng.exe frbnnop.exe PID 468 wrote to memory of 296 468 taskeng.exe frbnnop.exe PID 468 wrote to memory of 296 468 taskeng.exe frbnnop.exe PID 468 wrote to memory of 296 468 taskeng.exe frbnnop.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5366cfb7213ba42e13f5a07ba83a6353.exe"C:\Users\Admin\AppData\Local\Temp\5366cfb7213ba42e13f5a07ba83a6353.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
C:\Windows\system32\taskeng.exetaskeng.exe {7740D57C-F51B-411F-A0BD-03617B7CE5E9} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\ProgramData\wcji\nfmfg.exeC:\ProgramData\wcji\nfmfg.exe start2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1104 -
C:\Windows\TEMP\mgowgtd.exeC:\Windows\TEMP\mgowgtd.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:548 -
C:\ProgramData\rfpqb\frbnnop.exeC:\ProgramData\rfpqb\frbnnop.exe start2⤵
- Executes dropped EXE
PID:296
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\rfpqb\frbnnop.exeFilesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
-
C:\ProgramData\rfpqb\frbnnop.exeFilesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
-
C:\ProgramData\wcji\nfmfg.exeFilesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
-
C:\ProgramData\wcji\nfmfg.exeFilesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
-
C:\Windows\TEMP\mgowgtd.exeFilesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
-
C:\Windows\Tasks\nfmfg.jobFilesize
226B
MD514c1f19915c9e7513175dd8d4a0c37bc
SHA1d9cdeec40f95bb45b727a3b85b65dbe02b87d2d6
SHA256993cbfc400721320d3e733381736f973c5553b312caade2fab2e952d6a825cc3
SHA512f530680e6307ef6454f066a320097434024f6b85887d11afc7b45cdfa15d8dc7dd5ebf7150a65ac288b945449c27ae1a0b14a79995ac8bfc86c8bd699a4d11bc
-
C:\Windows\Temp\mgowgtd.exeFilesize
253KB
MD55366cfb7213ba42e13f5a07ba83a6353
SHA1958421f6fe7a2928578157c36b366578bc4e1b18
SHA2560f88cfd80dda550bf8ed08966821d84f6344fa6110b248e1148f06109c9a9f96
SHA512c91ec11e3b220a1723fe842329ac9fd23c468aaf7285db5d1fe47f4616e6053669d99a372e37d1055ee45ade04888b68ef35fd23b8b1f4a98e6e8a47008f6414
-
memory/296-75-0x0000000000000000-mapping.dmp
-
memory/296-80-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/296-79-0x00000000005FB000-0x000000000060C000-memory.dmpFilesize
68KB
-
memory/296-77-0x00000000005FB000-0x000000000060C000-memory.dmpFilesize
68KB
-
memory/548-67-0x0000000000000000-mapping.dmp
-
memory/548-69-0x00000000005BB000-0x00000000005CC000-memory.dmpFilesize
68KB
-
memory/548-72-0x00000000005BB000-0x00000000005CC000-memory.dmpFilesize
68KB
-
memory/548-73-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1104-62-0x000000000062B000-0x000000000063C000-memory.dmpFilesize
68KB
-
memory/1104-64-0x000000000062B000-0x000000000063C000-memory.dmpFilesize
68KB
-
memory/1104-65-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1104-60-0x0000000000000000-mapping.dmp
-
memory/1792-58-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1792-55-0x0000000075E51000-0x0000000075E53000-memory.dmpFilesize
8KB
-
memory/1792-56-0x00000000008EB000-0x00000000008FC000-memory.dmpFilesize
68KB
-
memory/1792-57-0x0000000000220000-0x0000000000229000-memory.dmpFilesize
36KB
-
memory/1792-54-0x00000000008EB000-0x00000000008FC000-memory.dmpFilesize
68KB