Analysis
-
max time kernel
153s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
18-04-2022 04:38
Static task
static1
Behavioral task
behavioral1
Sample
17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe
Resource
win7-20220414-en
General
-
Target
17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe
-
Size
90KB
-
MD5
50b7c39b62eed16c581f6f2d8b7f65fe
-
SHA1
462a4116dacd8e41e07a97c2e034653deba7eaba
-
SHA256
17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55
-
SHA512
b4e5f2ae8bae802fb9b0c1dd1ca5f1e62516927a28d5bf7921b9e7e2f0e91a1605b5cd359a51226a166f6df5caddb04f2cc155a2b7751411e5740e14fcefe7d9
Malware Config
Extracted
systembc
23hfdne.com:4035
23hfdne.xyz:4035
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rnrj.exepid process 1004 rnrj.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 10 api.ipify.org 9 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exedescription ioc process File created C:\Windows\Tasks\rnrj.job 17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe File opened for modification C:\Windows\Tasks\rnrj.job 17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2484 1476 WerFault.exe 17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exepid process 1476 17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe 1476 17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe"C:\Users\Admin\AppData\Local\Temp\17afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 9322⤵
- Program crash
PID:2484
-
-
C:\ProgramData\iwfdrv\rnrj.exeC:\ProgramData\iwfdrv\rnrj.exe start1⤵
- Executes dropped EXE
PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 1476 -ip 14761⤵PID:1280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD550b7c39b62eed16c581f6f2d8b7f65fe
SHA1462a4116dacd8e41e07a97c2e034653deba7eaba
SHA25617afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55
SHA512b4e5f2ae8bae802fb9b0c1dd1ca5f1e62516927a28d5bf7921b9e7e2f0e91a1605b5cd359a51226a166f6df5caddb04f2cc155a2b7751411e5740e14fcefe7d9
-
Filesize
90KB
MD550b7c39b62eed16c581f6f2d8b7f65fe
SHA1462a4116dacd8e41e07a97c2e034653deba7eaba
SHA25617afe1971ecfe1ba3fb63253a5aa773106ce132395d70e92f9f2227d85cd9c55
SHA512b4e5f2ae8bae802fb9b0c1dd1ca5f1e62516927a28d5bf7921b9e7e2f0e91a1605b5cd359a51226a166f6df5caddb04f2cc155a2b7751411e5740e14fcefe7d9