Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
28-03-2022 19:59
Static task
static1
Behavioral task
behavioral1
Sample
271fe3448d93bd8763141e498c63551bfbd4633c83f51af3a20d7d97120a05f2.exe
Resource
win7-20220311-en
General
-
Target
271fe3448d93bd8763141e498c63551bfbd4633c83f51af3a20d7d97120a05f2.exe
-
Size
308KB
-
MD5
ffcf9dc241ae44958360fce0600d1f79
-
SHA1
f469de123bbb6fc61d72a95b85260fc3b2f33ac4
-
SHA256
271fe3448d93bd8763141e498c63551bfbd4633c83f51af3a20d7d97120a05f2
-
SHA512
f923c49c078c15063ae6a96730286bbeeab0dd74f6f3b90edf6b57665cb288e6e1e013134593ace34756eef6ea650ed051295ea5de070fdf8465aeb4373e40df
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
-
Executes dropped EXE 1 IoCs
Processes:
sdkorva.exepid process 1396 sdkorva.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 api.ipify.org 19 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
271fe3448d93bd8763141e498c63551bfbd4633c83f51af3a20d7d97120a05f2.exedescription ioc process File created C:\Windows\Tasks\sdkorva.job 271fe3448d93bd8763141e498c63551bfbd4633c83f51af3a20d7d97120a05f2.exe File opened for modification C:\Windows\Tasks\sdkorva.job 271fe3448d93bd8763141e498c63551bfbd4633c83f51af3a20d7d97120a05f2.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1736 984 WerFault.exe 271fe3448d93bd8763141e498c63551bfbd4633c83f51af3a20d7d97120a05f2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
271fe3448d93bd8763141e498c63551bfbd4633c83f51af3a20d7d97120a05f2.exepid process 984 271fe3448d93bd8763141e498c63551bfbd4633c83f51af3a20d7d97120a05f2.exe 984 271fe3448d93bd8763141e498c63551bfbd4633c83f51af3a20d7d97120a05f2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\271fe3448d93bd8763141e498c63551bfbd4633c83f51af3a20d7d97120a05f2.exe"C:\Users\Admin\AppData\Local\Temp\271fe3448d93bd8763141e498c63551bfbd4633c83f51af3a20d7d97120a05f2.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 984 -s 4762⤵
- Program crash
PID:1736
-
-
C:\ProgramData\ucikij\sdkorva.exeC:\ProgramData\ucikij\sdkorva.exe start1⤵
- Executes dropped EXE
PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 984 -ip 9841⤵PID:4512
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5ffcf9dc241ae44958360fce0600d1f79
SHA1f469de123bbb6fc61d72a95b85260fc3b2f33ac4
SHA256271fe3448d93bd8763141e498c63551bfbd4633c83f51af3a20d7d97120a05f2
SHA512f923c49c078c15063ae6a96730286bbeeab0dd74f6f3b90edf6b57665cb288e6e1e013134593ace34756eef6ea650ed051295ea5de070fdf8465aeb4373e40df
-
Filesize
308KB
MD5ffcf9dc241ae44958360fce0600d1f79
SHA1f469de123bbb6fc61d72a95b85260fc3b2f33ac4
SHA256271fe3448d93bd8763141e498c63551bfbd4633c83f51af3a20d7d97120a05f2
SHA512f923c49c078c15063ae6a96730286bbeeab0dd74f6f3b90edf6b57665cb288e6e1e013134593ace34756eef6ea650ed051295ea5de070fdf8465aeb4373e40df