Analysis
-
max time kernel
4294211s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
28-03-2022 17:54
Static task
static1
Behavioral task
behavioral1
Sample
b7a122f6adabcddb7744f3a31e593f5f4ad80e0d433eee8b6d61c13e86731152.exe
Resource
win7-20220311-en
General
-
Target
b7a122f6adabcddb7744f3a31e593f5f4ad80e0d433eee8b6d61c13e86731152.exe
-
Size
98KB
-
MD5
b0a7c828e9567926e1e6f7d846472d4e
-
SHA1
350ef211ce98cebdd6ac0a2260a53c16197d65fb
-
SHA256
b7a122f6adabcddb7744f3a31e593f5f4ad80e0d433eee8b6d61c13e86731152
-
SHA512
326bc5717f4fe6767a0708b31ca68eb8dd87309ead3693707b803581f8d743705195f5ffd7b006d5b6ad5f84d60bac48f889c1d85578e0dd9947e6ab28a7bf77
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
-
Executes dropped EXE 1 IoCs
Processes:
haqesj.exepid process 784 haqesj.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
b7a122f6adabcddb7744f3a31e593f5f4ad80e0d433eee8b6d61c13e86731152.exedescription ioc process File created C:\Windows\Tasks\haqesj.job b7a122f6adabcddb7744f3a31e593f5f4ad80e0d433eee8b6d61c13e86731152.exe File opened for modification C:\Windows\Tasks\haqesj.job b7a122f6adabcddb7744f3a31e593f5f4ad80e0d433eee8b6d61c13e86731152.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
b7a122f6adabcddb7744f3a31e593f5f4ad80e0d433eee8b6d61c13e86731152.exepid process 1168 b7a122f6adabcddb7744f3a31e593f5f4ad80e0d433eee8b6d61c13e86731152.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 580 wrote to memory of 784 580 taskeng.exe haqesj.exe PID 580 wrote to memory of 784 580 taskeng.exe haqesj.exe PID 580 wrote to memory of 784 580 taskeng.exe haqesj.exe PID 580 wrote to memory of 784 580 taskeng.exe haqesj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7a122f6adabcddb7744f3a31e593f5f4ad80e0d433eee8b6d61c13e86731152.exe"C:\Users\Admin\AppData\Local\Temp\b7a122f6adabcddb7744f3a31e593f5f4ad80e0d433eee8b6d61c13e86731152.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1168
-
C:\Windows\system32\taskeng.exetaskeng.exe {66733C6C-3BC9-4796-95B8-C68B84689791} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\ProgramData\lqwqse\haqesj.exeC:\ProgramData\lqwqse\haqesj.exe start2⤵
- Executes dropped EXE
PID:784
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5b0a7c828e9567926e1e6f7d846472d4e
SHA1350ef211ce98cebdd6ac0a2260a53c16197d65fb
SHA256b7a122f6adabcddb7744f3a31e593f5f4ad80e0d433eee8b6d61c13e86731152
SHA512326bc5717f4fe6767a0708b31ca68eb8dd87309ead3693707b803581f8d743705195f5ffd7b006d5b6ad5f84d60bac48f889c1d85578e0dd9947e6ab28a7bf77
-
Filesize
98KB
MD5b0a7c828e9567926e1e6f7d846472d4e
SHA1350ef211ce98cebdd6ac0a2260a53c16197d65fb
SHA256b7a122f6adabcddb7744f3a31e593f5f4ad80e0d433eee8b6d61c13e86731152
SHA512326bc5717f4fe6767a0708b31ca68eb8dd87309ead3693707b803581f8d743705195f5ffd7b006d5b6ad5f84d60bac48f889c1d85578e0dd9947e6ab28a7bf77