Analysis
-
max time kernel
4294208s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
28-03-2022 18:04
Static task
static1
Behavioral task
behavioral1
Sample
31fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f.exe
Resource
win7-20220311-en
General
-
Target
31fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f.exe
-
Size
157KB
-
MD5
f4a85ad0057ce4c4a622471228cb2e6c
-
SHA1
24c344f1a33b3e6d2bd8fd301475c23bb8a6f30f
-
SHA256
31fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f
-
SHA512
03a4116994862357b8b162595c1ea3a5019a38411cedefcd2bed8f26bc60ca4204be1d3ea9bda306365a46cf1f43deeb90d848853238944b803fa77759911f0c
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
hijgqpt.exepid process 1556 hijgqpt.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
31fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f.exedescription ioc process File created C:\Windows\Tasks\hijgqpt.job 31fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f.exe File opened for modification C:\Windows\Tasks\hijgqpt.job 31fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
31fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f.exepid process 1676 31fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 616 wrote to memory of 1556 616 taskeng.exe hijgqpt.exe PID 616 wrote to memory of 1556 616 taskeng.exe hijgqpt.exe PID 616 wrote to memory of 1556 616 taskeng.exe hijgqpt.exe PID 616 wrote to memory of 1556 616 taskeng.exe hijgqpt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f.exe"C:\Users\Admin\AppData\Local\Temp\31fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
C:\Windows\system32\taskeng.exetaskeng.exe {323A994C-9849-4025-855D-60C17ED54A90} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:616 -
C:\ProgramData\nnnm\hijgqpt.exeC:\ProgramData\nnnm\hijgqpt.exe start2⤵
- Executes dropped EXE
PID:1556
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD5f4a85ad0057ce4c4a622471228cb2e6c
SHA124c344f1a33b3e6d2bd8fd301475c23bb8a6f30f
SHA25631fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f
SHA51203a4116994862357b8b162595c1ea3a5019a38411cedefcd2bed8f26bc60ca4204be1d3ea9bda306365a46cf1f43deeb90d848853238944b803fa77759911f0c
-
Filesize
157KB
MD5f4a85ad0057ce4c4a622471228cb2e6c
SHA124c344f1a33b3e6d2bd8fd301475c23bb8a6f30f
SHA25631fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f
SHA51203a4116994862357b8b162595c1ea3a5019a38411cedefcd2bed8f26bc60ca4204be1d3ea9bda306365a46cf1f43deeb90d848853238944b803fa77759911f0c