Analysis
-
max time kernel
85s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
03-04-2022 20:46
Static task
static1
Behavioral task
behavioral1
Sample
0f28f76319032731d48add6e6151dd43.exe
Resource
win7-20220331-en
windows7_x64
0 signatures
0 seconds
General
-
Target
0f28f76319032731d48add6e6151dd43.exe
-
Size
233KB
-
MD5
0f28f76319032731d48add6e6151dd43
-
SHA1
c3eb544fd54c82318b46de7db1480bc91160dbbf
-
SHA256
f75ff7d2557cde3b8745dc14ac93ea6c6876449549ee3f135a47b523e1cb6c6f
-
SHA512
c65c1da71400098c2baaa0281c0c6407955f5f54eb7d532304c085798ba52eeb0881704fcb1fa5c56702b7ea10236d2d12a64477efb8776bf4b89d7ca662b69b
Malware Config
Extracted
Family
systembc
C2
104.144.69.123:4001
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
0f28f76319032731d48add6e6151dd43.exedescription ioc process File opened for modification C:\Windows\Tasks\wow64.job 0f28f76319032731d48add6e6151dd43.exe File created C:\Windows\Tasks\wow64.job 0f28f76319032731d48add6e6151dd43.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 944 wrote to memory of 1716 944 taskeng.exe 0f28f76319032731d48add6e6151dd43.exe PID 944 wrote to memory of 1716 944 taskeng.exe 0f28f76319032731d48add6e6151dd43.exe PID 944 wrote to memory of 1716 944 taskeng.exe 0f28f76319032731d48add6e6151dd43.exe PID 944 wrote to memory of 1716 944 taskeng.exe 0f28f76319032731d48add6e6151dd43.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f28f76319032731d48add6e6151dd43.exe"C:\Users\Admin\AppData\Local\Temp\0f28f76319032731d48add6e6151dd43.exe"1⤵
- Drops file in Windows directory
PID:1052
-
C:\Windows\system32\taskeng.exetaskeng.exe {9F0675BB-A8E6-4C07-905A-8DB5E451366A} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\0f28f76319032731d48add6e6151dd43.exeC:\Users\Admin\AppData\Local\Temp\0f28f76319032731d48add6e6151dd43.exe start2⤵PID:1716
-