Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
15-04-2022 02:19
Static task
static1
Behavioral task
behavioral1
Sample
8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe
Resource
win7-20220414-en
General
-
Target
8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe
-
Size
318KB
-
MD5
69ab4ae7051a7962e610f4a8cc56d634
-
SHA1
9275cfb1e28dc75e614ab1fc6b7d0783a556cce1
-
SHA256
8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41
-
SHA512
521486297dc22c5f6e02dda6bca8789a13ed5d6d91bc1fed1342bcfcfabac3f0771e057d5afc1af1be8ca9552b80a0e81b93e7b5a90c81c803b2eb3485285c7f
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
dwouan.exepid process 4960 dwouan.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 6 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exedescription ioc process File created C:\Windows\Tasks\dwouan.job 8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe File opened for modification C:\Windows\Tasks\dwouan.job 8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4424 4568 WerFault.exe 8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exepid process 4568 8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe 4568 8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe"C:\Users\Admin\AppData\Local\Temp\8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 9362⤵
- Program crash
PID:4424
-
-
C:\ProgramData\kouo\dwouan.exeC:\ProgramData\kouo\dwouan.exe start1⤵
- Executes dropped EXE
PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4568 -ip 45681⤵PID:2952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD569ab4ae7051a7962e610f4a8cc56d634
SHA19275cfb1e28dc75e614ab1fc6b7d0783a556cce1
SHA2568e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41
SHA512521486297dc22c5f6e02dda6bca8789a13ed5d6d91bc1fed1342bcfcfabac3f0771e057d5afc1af1be8ca9552b80a0e81b93e7b5a90c81c803b2eb3485285c7f
-
Filesize
318KB
MD569ab4ae7051a7962e610f4a8cc56d634
SHA19275cfb1e28dc75e614ab1fc6b7d0783a556cce1
SHA2568e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41
SHA512521486297dc22c5f6e02dda6bca8789a13ed5d6d91bc1fed1342bcfcfabac3f0771e057d5afc1af1be8ca9552b80a0e81b93e7b5a90c81c803b2eb3485285c7f