Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
30-03-2022 01:26
Static task
static1
Behavioral task
behavioral1
Sample
f59636192874b9735dc7a4cb55eb0aa64e5499df1e7154a807b3cc0a46e35572.exe
Resource
win7-20220311-en
General
-
Target
f59636192874b9735dc7a4cb55eb0aa64e5499df1e7154a807b3cc0a46e35572.exe
-
Size
152KB
-
MD5
fdc04e9186fa3085fac12d029542ae33
-
SHA1
168d4d4614d89fa69bb9af26d7373ceae5ea09b3
-
SHA256
f59636192874b9735dc7a4cb55eb0aa64e5499df1e7154a807b3cc0a46e35572
-
SHA512
e3f3baa0331d371f22891288542ca04057f06cb0e288c2cb34e7e9ed008116e8f8361ea10dca6a1fd38bbc5093cf1981e51f79b2a128cd569cbf9bc742ad82c0
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
-
Executes dropped EXE 1 IoCs
Processes:
nqboesi.exepid process 1696 nqboesi.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 22 api.ipify.org 23 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
f59636192874b9735dc7a4cb55eb0aa64e5499df1e7154a807b3cc0a46e35572.exedescription ioc process File created C:\Windows\Tasks\nqboesi.job f59636192874b9735dc7a4cb55eb0aa64e5499df1e7154a807b3cc0a46e35572.exe File opened for modification C:\Windows\Tasks\nqboesi.job f59636192874b9735dc7a4cb55eb0aa64e5499df1e7154a807b3cc0a46e35572.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1860 2608 WerFault.exe f59636192874b9735dc7a4cb55eb0aa64e5499df1e7154a807b3cc0a46e35572.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f59636192874b9735dc7a4cb55eb0aa64e5499df1e7154a807b3cc0a46e35572.exepid process 2608 f59636192874b9735dc7a4cb55eb0aa64e5499df1e7154a807b3cc0a46e35572.exe 2608 f59636192874b9735dc7a4cb55eb0aa64e5499df1e7154a807b3cc0a46e35572.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f59636192874b9735dc7a4cb55eb0aa64e5499df1e7154a807b3cc0a46e35572.exe"C:\Users\Admin\AppData\Local\Temp\f59636192874b9735dc7a4cb55eb0aa64e5499df1e7154a807b3cc0a46e35572.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 4842⤵
- Program crash
PID:1860
-
-
C:\ProgramData\rixis\nqboesi.exeC:\ProgramData\rixis\nqboesi.exe start1⤵
- Executes dropped EXE
PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2608 -ip 26081⤵PID:3948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5fdc04e9186fa3085fac12d029542ae33
SHA1168d4d4614d89fa69bb9af26d7373ceae5ea09b3
SHA256f59636192874b9735dc7a4cb55eb0aa64e5499df1e7154a807b3cc0a46e35572
SHA512e3f3baa0331d371f22891288542ca04057f06cb0e288c2cb34e7e9ed008116e8f8361ea10dca6a1fd38bbc5093cf1981e51f79b2a128cd569cbf9bc742ad82c0
-
Filesize
152KB
MD5fdc04e9186fa3085fac12d029542ae33
SHA1168d4d4614d89fa69bb9af26d7373ceae5ea09b3
SHA256f59636192874b9735dc7a4cb55eb0aa64e5499df1e7154a807b3cc0a46e35572
SHA512e3f3baa0331d371f22891288542ca04057f06cb0e288c2cb34e7e9ed008116e8f8361ea10dca6a1fd38bbc5093cf1981e51f79b2a128cd569cbf9bc742ad82c0