Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-04-2022 02:19
Static task
static1
Behavioral task
behavioral1
Sample
8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe
Resource
win7-20220414-en
General
-
Target
8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe
-
Size
318KB
-
MD5
69ab4ae7051a7962e610f4a8cc56d634
-
SHA1
9275cfb1e28dc75e614ab1fc6b7d0783a556cce1
-
SHA256
8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41
-
SHA512
521486297dc22c5f6e02dda6bca8789a13ed5d6d91bc1fed1342bcfcfabac3f0771e057d5afc1af1be8ca9552b80a0e81b93e7b5a90c81c803b2eb3485285c7f
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
xdqv.exepid process 1764 xdqv.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exedescription ioc process File created C:\Windows\Tasks\xdqv.job 8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe File opened for modification C:\Windows\Tasks\xdqv.job 8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exepid process 1884 8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1900 wrote to memory of 1764 1900 taskeng.exe xdqv.exe PID 1900 wrote to memory of 1764 1900 taskeng.exe xdqv.exe PID 1900 wrote to memory of 1764 1900 taskeng.exe xdqv.exe PID 1900 wrote to memory of 1764 1900 taskeng.exe xdqv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe"C:\Users\Admin\AppData\Local\Temp\8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
C:\Windows\system32\taskeng.exetaskeng.exe {264E0DB4-4B9F-4FE3-A9A0-E3631C650506} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\ProgramData\vsixfd\xdqv.exeC:\ProgramData\vsixfd\xdqv.exe start2⤵
- Executes dropped EXE
PID:1764
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD569ab4ae7051a7962e610f4a8cc56d634
SHA19275cfb1e28dc75e614ab1fc6b7d0783a556cce1
SHA2568e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41
SHA512521486297dc22c5f6e02dda6bca8789a13ed5d6d91bc1fed1342bcfcfabac3f0771e057d5afc1af1be8ca9552b80a0e81b93e7b5a90c81c803b2eb3485285c7f
-
Filesize
318KB
MD569ab4ae7051a7962e610f4a8cc56d634
SHA19275cfb1e28dc75e614ab1fc6b7d0783a556cce1
SHA2568e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41
SHA512521486297dc22c5f6e02dda6bca8789a13ed5d6d91bc1fed1342bcfcfabac3f0771e057d5afc1af1be8ca9552b80a0e81b93e7b5a90c81c803b2eb3485285c7f