Analysis
-
max time kernel
151s -
max time network
178s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
14-04-2022 06:19
Static task
static1
Behavioral task
behavioral1
Sample
b0447405eb71302c0c7f5caf439a9ccada14c7539fad803c45841171dc785a9a.exe
Resource
win7-20220331-en
General
-
Target
b0447405eb71302c0c7f5caf439a9ccada14c7539fad803c45841171dc785a9a.exe
-
Size
339KB
-
MD5
0fe587befbb434b018985d6a1fea727c
-
SHA1
421424778acaf5c01b591fae09f1ea2ea687830c
-
SHA256
b0447405eb71302c0c7f5caf439a9ccada14c7539fad803c45841171dc785a9a
-
SHA512
7da23fde6f98826860687fd8c3e4a03d24a8a1da40825ea15cd30fbb6e867311b98e6d965f57073fa430738cc27bdb81eb0072bf70c280deb1e3cded6975b764
Malware Config
Extracted
systembc
asdasd08.com:4039
asdasd08.xyz:4039
Signatures
-
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
-
Executes dropped EXE 1 IoCs
Processes:
vhwt.exepid process 1948 vhwt.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
b0447405eb71302c0c7f5caf439a9ccada14c7539fad803c45841171dc785a9a.exedescription ioc process File created C:\Windows\Tasks\vhwt.job b0447405eb71302c0c7f5caf439a9ccada14c7539fad803c45841171dc785a9a.exe File opened for modification C:\Windows\Tasks\vhwt.job b0447405eb71302c0c7f5caf439a9ccada14c7539fad803c45841171dc785a9a.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
b0447405eb71302c0c7f5caf439a9ccada14c7539fad803c45841171dc785a9a.exepid process 920 b0447405eb71302c0c7f5caf439a9ccada14c7539fad803c45841171dc785a9a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1752 wrote to memory of 1948 1752 taskeng.exe vhwt.exe PID 1752 wrote to memory of 1948 1752 taskeng.exe vhwt.exe PID 1752 wrote to memory of 1948 1752 taskeng.exe vhwt.exe PID 1752 wrote to memory of 1948 1752 taskeng.exe vhwt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0447405eb71302c0c7f5caf439a9ccada14c7539fad803c45841171dc785a9a.exe"C:\Users\Admin\AppData\Local\Temp\b0447405eb71302c0c7f5caf439a9ccada14c7539fad803c45841171dc785a9a.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:920
-
C:\Windows\system32\taskeng.exetaskeng.exe {2A7005A8-5674-4B3F-87F0-F97954794309} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\ProgramData\gsbj\vhwt.exeC:\ProgramData\gsbj\vhwt.exe start2⤵
- Executes dropped EXE
PID:1948
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
339KB
MD50fe587befbb434b018985d6a1fea727c
SHA1421424778acaf5c01b591fae09f1ea2ea687830c
SHA256b0447405eb71302c0c7f5caf439a9ccada14c7539fad803c45841171dc785a9a
SHA5127da23fde6f98826860687fd8c3e4a03d24a8a1da40825ea15cd30fbb6e867311b98e6d965f57073fa430738cc27bdb81eb0072bf70c280deb1e3cded6975b764
-
Filesize
339KB
MD50fe587befbb434b018985d6a1fea727c
SHA1421424778acaf5c01b591fae09f1ea2ea687830c
SHA256b0447405eb71302c0c7f5caf439a9ccada14c7539fad803c45841171dc785a9a
SHA5127da23fde6f98826860687fd8c3e4a03d24a8a1da40825ea15cd30fbb6e867311b98e6d965f57073fa430738cc27bdb81eb0072bf70c280deb1e3cded6975b764