Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 07:59
Static task
static1
Behavioral task
behavioral1
Sample
88f4f48515fa6a2e7499d28c5d1a6c3558785c1b136ce60c5815a5f9095cb1a9.exe
Resource
win7-20220414-en
General
-
Target
88f4f48515fa6a2e7499d28c5d1a6c3558785c1b136ce60c5815a5f9095cb1a9.exe
-
Size
357KB
-
MD5
32294f57e6775a1395ece90371a9deb3
-
SHA1
f10794c6e6df36de1d5709492f25b9a5a5a246ae
-
SHA256
88f4f48515fa6a2e7499d28c5d1a6c3558785c1b136ce60c5815a5f9095cb1a9
-
SHA512
6cf3b10b5b5dc96a57a0ceb7376c31821e821b05900edf95ead5dc70ed2b2d8bab39d950ae6653fce8a1345d9dc0ef15256ccf2116fe3cb16c40713c8cc25677
Malware Config
Extracted
systembc
26asdcgd.com:4039
26asdcgd.xyz:4039
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
fkewxg.exepid process 1152 fkewxg.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org 5 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
88f4f48515fa6a2e7499d28c5d1a6c3558785c1b136ce60c5815a5f9095cb1a9.exedescription ioc process File created C:\Windows\Tasks\fkewxg.job 88f4f48515fa6a2e7499d28c5d1a6c3558785c1b136ce60c5815a5f9095cb1a9.exe File opened for modification C:\Windows\Tasks\fkewxg.job 88f4f48515fa6a2e7499d28c5d1a6c3558785c1b136ce60c5815a5f9095cb1a9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
88f4f48515fa6a2e7499d28c5d1a6c3558785c1b136ce60c5815a5f9095cb1a9.exepid process 1520 88f4f48515fa6a2e7499d28c5d1a6c3558785c1b136ce60c5815a5f9095cb1a9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1356 wrote to memory of 1152 1356 taskeng.exe fkewxg.exe PID 1356 wrote to memory of 1152 1356 taskeng.exe fkewxg.exe PID 1356 wrote to memory of 1152 1356 taskeng.exe fkewxg.exe PID 1356 wrote to memory of 1152 1356 taskeng.exe fkewxg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88f4f48515fa6a2e7499d28c5d1a6c3558785c1b136ce60c5815a5f9095cb1a9.exe"C:\Users\Admin\AppData\Local\Temp\88f4f48515fa6a2e7499d28c5d1a6c3558785c1b136ce60c5815a5f9095cb1a9.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
C:\Windows\system32\taskeng.exetaskeng.exe {76699236-F41B-471E-AEE6-27221BE7FFA3} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\ProgramData\tndeg\fkewxg.exeC:\ProgramData\tndeg\fkewxg.exe start2⤵
- Executes dropped EXE
PID:1152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\tndeg\fkewxg.exeFilesize
357KB
MD532294f57e6775a1395ece90371a9deb3
SHA1f10794c6e6df36de1d5709492f25b9a5a5a246ae
SHA25688f4f48515fa6a2e7499d28c5d1a6c3558785c1b136ce60c5815a5f9095cb1a9
SHA5126cf3b10b5b5dc96a57a0ceb7376c31821e821b05900edf95ead5dc70ed2b2d8bab39d950ae6653fce8a1345d9dc0ef15256ccf2116fe3cb16c40713c8cc25677
-
C:\ProgramData\tndeg\fkewxg.exeFilesize
357KB
MD532294f57e6775a1395ece90371a9deb3
SHA1f10794c6e6df36de1d5709492f25b9a5a5a246ae
SHA25688f4f48515fa6a2e7499d28c5d1a6c3558785c1b136ce60c5815a5f9095cb1a9
SHA5126cf3b10b5b5dc96a57a0ceb7376c31821e821b05900edf95ead5dc70ed2b2d8bab39d950ae6653fce8a1345d9dc0ef15256ccf2116fe3cb16c40713c8cc25677
-
memory/1152-60-0x0000000000000000-mapping.dmp
-
memory/1152-62-0x00000000002D9000-0x00000000002DF000-memory.dmpFilesize
24KB
-
memory/1152-64-0x00000000002D9000-0x00000000002DF000-memory.dmpFilesize
24KB
-
memory/1152-65-0x0000000000400000-0x0000000000C33000-memory.dmpFilesize
8.2MB
-
memory/1520-54-0x0000000000D39000-0x0000000000D3F000-memory.dmpFilesize
24KB
-
memory/1520-55-0x0000000076451000-0x0000000076453000-memory.dmpFilesize
8KB
-
memory/1520-57-0x0000000000220000-0x0000000000229000-memory.dmpFilesize
36KB
-
memory/1520-56-0x0000000000D39000-0x0000000000D3F000-memory.dmpFilesize
24KB
-
memory/1520-58-0x0000000000400000-0x0000000000C33000-memory.dmpFilesize
8.2MB