Analysis
-
max time kernel
144s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
18-04-2022 04:38
Static task
static1
Behavioral task
behavioral1
Sample
17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe
Resource
win7-20220414-en
General
-
Target
17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe
-
Size
90KB
-
MD5
50b7c39b62eed16c581f6f2d8b7f65fe
-
SHA1
462a4116dacd8e41e07a97c2e034653deba7eaba
-
SHA256
17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55
-
SHA512
b4e5f2ae8bae802fb9b0c1dd1ca5f1e62516927a28d5bf7921b9e7e2f0e91a1605b5cd359a51226a166f6df5caddb04f2cc155a2b7751411e5740e14fcefe7d9
Malware Config
Extracted
systembc
23hfdne.com:4035
23hfdne.xyz:4035
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
cbkaw.exepid process 1392 cbkaw.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exedescription ioc process File created C:\Windows\Tasks\cbkaw.job 17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe File opened for modification C:\Windows\Tasks\cbkaw.job 17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exepid process 1972 17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 620 wrote to memory of 1392 620 taskeng.exe cbkaw.exe PID 620 wrote to memory of 1392 620 taskeng.exe cbkaw.exe PID 620 wrote to memory of 1392 620 taskeng.exe cbkaw.exe PID 620 wrote to memory of 1392 620 taskeng.exe cbkaw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe"C:\Users\Admin\AppData\Local\Temp\17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
C:\Windows\system32\taskeng.exetaskeng.exe {6FF2F842-31EF-41E2-86F9-3F49B95C12E9} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\ProgramData\xgsgfrb\cbkaw.exeC:\ProgramData\xgsgfrb\cbkaw.exe start2⤵
- Executes dropped EXE
PID:1392
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD550b7c39b62eed16c581f6f2d8b7f65fe
SHA1462a4116dacd8e41e07a97c2e034653deba7eaba
SHA25617afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55
SHA512b4e5f2ae8bae802fb9b0c1dd1ca5f1e62516927a28d5bf7921b9e7e2f0e91a1605b5cd359a51226a166f6df5caddb04f2cc155a2b7751411e5740e14fcefe7d9
-
Filesize
90KB
MD550b7c39b62eed16c581f6f2d8b7f65fe
SHA1462a4116dacd8e41e07a97c2e034653deba7eaba
SHA25617afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55
SHA512b4e5f2ae8bae802fb9b0c1dd1ca5f1e62516927a28d5bf7921b9e7e2f0e91a1605b5cd359a51226a166f6df5caddb04f2cc155a2b7751411e5740e14fcefe7d9