Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
14-04-2022 06:52
Static task
static1
Behavioral task
behavioral1
Sample
da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24.exe
Resource
win7-20220331-en
General
-
Target
da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24.exe
-
Size
87KB
-
MD5
dbfa6717c7f896d0d19696866e0dba24
-
SHA1
78426c577a9d521f96010efaa8d1038773e5f853
-
SHA256
da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24
-
SHA512
5f4601e79e2b2348dfcd56eac79c85160545d3c279bc1027c14aa533a38f0ecd457575144eb4485fbd5d580c7a2865e9bd6aa12f2df123ab8dff888ca586a249
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
-
Executes dropped EXE 1 IoCs
Processes:
qaxfiwp.exepid process 2040 qaxfiwp.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 88.198.207.48 -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org 5 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24.exedescription ioc process File created C:\Windows\Tasks\qaxfiwp.job da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24.exe File opened for modification C:\Windows\Tasks\qaxfiwp.job da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24.exepid process 1892 da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1072 wrote to memory of 2040 1072 taskeng.exe qaxfiwp.exe PID 1072 wrote to memory of 2040 1072 taskeng.exe qaxfiwp.exe PID 1072 wrote to memory of 2040 1072 taskeng.exe qaxfiwp.exe PID 1072 wrote to memory of 2040 1072 taskeng.exe qaxfiwp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24.exe"C:\Users\Admin\AppData\Local\Temp\da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1892
-
C:\Windows\system32\taskeng.exetaskeng.exe {B170AF2D-BBC1-4E2C-83E3-133EC68A65FB} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\ProgramData\gbcts\qaxfiwp.exeC:\ProgramData\gbcts\qaxfiwp.exe start2⤵
- Executes dropped EXE
PID:2040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\gbcts\qaxfiwp.exeFilesize
87KB
MD5dbfa6717c7f896d0d19696866e0dba24
SHA178426c577a9d521f96010efaa8d1038773e5f853
SHA256da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24
SHA5125f4601e79e2b2348dfcd56eac79c85160545d3c279bc1027c14aa533a38f0ecd457575144eb4485fbd5d580c7a2865e9bd6aa12f2df123ab8dff888ca586a249
-
C:\ProgramData\gbcts\qaxfiwp.exeFilesize
87KB
MD5dbfa6717c7f896d0d19696866e0dba24
SHA178426c577a9d521f96010efaa8d1038773e5f853
SHA256da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24
SHA5125f4601e79e2b2348dfcd56eac79c85160545d3c279bc1027c14aa533a38f0ecd457575144eb4485fbd5d580c7a2865e9bd6aa12f2df123ab8dff888ca586a249
-
memory/1892-55-0x0000000075E41000-0x0000000075E43000-memory.dmpFilesize
8KB
-
memory/1892-57-0x00000000003A0000-0x00000000003A9000-memory.dmpFilesize
36KB
-
memory/1892-56-0x0000000000230000-0x0000000000330000-memory.dmpFilesize
1024KB
-
memory/1892-58-0x0000000000400000-0x0000000002FA1000-memory.dmpFilesize
43.6MB
-
memory/2040-60-0x0000000000000000-mapping.dmp
-
memory/2040-62-0x000000000314B000-0x0000000003152000-memory.dmpFilesize
28KB
-
memory/2040-64-0x000000000314B000-0x0000000003152000-memory.dmpFilesize
28KB
-
memory/2040-65-0x0000000000400000-0x0000000002FA1000-memory.dmpFilesize
43.6MB