Analysis
-
max time kernel
173s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 17:50
Static task
static1
Behavioral task
behavioral1
Sample
c51cf33451f5667a1a5ff3790cfe930580f00cbccbc8c7d19876c1048deed18a.exe
Resource
win7-20220414-en
General
-
Target
c51cf33451f5667a1a5ff3790cfe930580f00cbccbc8c7d19876c1048deed18a.exe
-
Size
96KB
-
MD5
a04c8b219c9cc54437b337b0f9efbf9b
-
SHA1
2f8c91d4074917f25be71102344d8415aa2b1756
-
SHA256
c51cf33451f5667a1a5ff3790cfe930580f00cbccbc8c7d19876c1048deed18a
-
SHA512
0baf265384b689f2414b10e6628a5c84fae66728618954784944e176e202eff988a20f9e1fcb35b44f3df23c87dcbdddad9485d1d97975ff4f1515e8e547ac6b
Malware Config
Extracted
systembc
23hfdne.com:4035
23hfdne.xyz:4035
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
tffhuq.exepid process 2604 tffhuq.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 api.ipify.org 12 api.ipify.org 21 api.ipify.org 22 api.ipify.org -
Drops file in Windows directory 2 IoCs
Processes:
c51cf33451f5667a1a5ff3790cfe930580f00cbccbc8c7d19876c1048deed18a.exedescription ioc process File created C:\Windows\Tasks\tffhuq.job c51cf33451f5667a1a5ff3790cfe930580f00cbccbc8c7d19876c1048deed18a.exe File opened for modification C:\Windows\Tasks\tffhuq.job c51cf33451f5667a1a5ff3790cfe930580f00cbccbc8c7d19876c1048deed18a.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3880 3416 WerFault.exe c51cf33451f5667a1a5ff3790cfe930580f00cbccbc8c7d19876c1048deed18a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
c51cf33451f5667a1a5ff3790cfe930580f00cbccbc8c7d19876c1048deed18a.exepid process 3416 c51cf33451f5667a1a5ff3790cfe930580f00cbccbc8c7d19876c1048deed18a.exe 3416 c51cf33451f5667a1a5ff3790cfe930580f00cbccbc8c7d19876c1048deed18a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c51cf33451f5667a1a5ff3790cfe930580f00cbccbc8c7d19876c1048deed18a.exe"C:\Users\Admin\AppData\Local\Temp\c51cf33451f5667a1a5ff3790cfe930580f00cbccbc8c7d19876c1048deed18a.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 9362⤵
- Program crash
PID:3880
-
C:\ProgramData\thcsjbj\tffhuq.exeC:\ProgramData\thcsjbj\tffhuq.exe start1⤵
- Executes dropped EXE
PID:2604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3416 -ip 34161⤵PID:2920
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\thcsjbj\tffhuq.exeFilesize
96KB
MD5a04c8b219c9cc54437b337b0f9efbf9b
SHA12f8c91d4074917f25be71102344d8415aa2b1756
SHA256c51cf33451f5667a1a5ff3790cfe930580f00cbccbc8c7d19876c1048deed18a
SHA5120baf265384b689f2414b10e6628a5c84fae66728618954784944e176e202eff988a20f9e1fcb35b44f3df23c87dcbdddad9485d1d97975ff4f1515e8e547ac6b
-
C:\ProgramData\thcsjbj\tffhuq.exeFilesize
96KB
MD5a04c8b219c9cc54437b337b0f9efbf9b
SHA12f8c91d4074917f25be71102344d8415aa2b1756
SHA256c51cf33451f5667a1a5ff3790cfe930580f00cbccbc8c7d19876c1048deed18a
SHA5120baf265384b689f2414b10e6628a5c84fae66728618954784944e176e202eff988a20f9e1fcb35b44f3df23c87dcbdddad9485d1d97975ff4f1515e8e547ac6b
-
memory/2604-136-0x00000000006C3000-0x00000000006C9000-memory.dmpFilesize
24KB
-
memory/2604-137-0x00000000006C3000-0x00000000006C9000-memory.dmpFilesize
24KB
-
memory/2604-138-0x0000000000630000-0x0000000000639000-memory.dmpFilesize
36KB
-
memory/2604-139-0x0000000000400000-0x00000000004D2000-memory.dmpFilesize
840KB
-
memory/3416-130-0x0000000000749000-0x000000000074F000-memory.dmpFilesize
24KB
-
memory/3416-131-0x0000000000749000-0x000000000074F000-memory.dmpFilesize
24KB
-
memory/3416-132-0x00000000020D0000-0x00000000020D9000-memory.dmpFilesize
36KB
-
memory/3416-133-0x0000000000400000-0x00000000004D2000-memory.dmpFilesize
840KB