Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
18-04-2022 10:15
Static task
static1
Behavioral task
behavioral1
Sample
2acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec.exe
Resource
win7-20220414-en
General
-
Target
2acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec.exe
-
Size
357KB
-
MD5
6adff82e37aadb238d58699f857e5f8b
-
SHA1
f779cdc5c8d6a8595a0850cb8fb7097e4f74f66d
-
SHA256
2acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec
-
SHA512
e9edae21aa6708690ed8a7df2555e48121677d43f3994f2407ca4ead9ac775a02cb73e367830c9cd8f49587e43a7c5a546cc400c5a46ce00e9fef81f3fb4eb96
Malware Config
Extracted
systembc
sdadvert197.com:4044
mexstat128.com:4044
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
sexwh.exepid process 4268 sexwh.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 api.ipify.org 18 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
2acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec.exedescription ioc process File created C:\Windows\Tasks\sexwh.job 2acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec.exe File opened for modification C:\Windows\Tasks\sexwh.job 2acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec.exe -
Program crash 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4256 3248 WerFault.exe 2acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec.exe 4856 4268 WerFault.exe sexwh.exe 4520 4268 WerFault.exe sexwh.exe 448 3248 WerFault.exe 2acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec.exe 2104 3248 WerFault.exe 2acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec.exe 224 4268 WerFault.exe sexwh.exe 4876 4268 WerFault.exe sexwh.exe 4904 3248 WerFault.exe 2acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec.exepid process 3248 2acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec.exe 3248 2acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec.exe"C:\Users\Admin\AppData\Local\Temp\2acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 4842⤵
- Program crash
PID:4256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 9402⤵
- Program crash
PID:448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 9642⤵
- Program crash
PID:2104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 9482⤵
- Program crash
PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3248 -ip 32481⤵PID:4204
-
C:\ProgramData\mdde\sexwh.exeC:\ProgramData\mdde\sexwh.exe start1⤵
- Executes dropped EXE
PID:4268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 4802⤵
- Program crash
PID:4856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 7562⤵
- Program crash
PID:4520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 7762⤵
- Program crash
PID:224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 7322⤵
- Program crash
PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4268 -ip 42681⤵PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4268 -ip 42681⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3248 -ip 32481⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3248 -ip 32481⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4268 -ip 42681⤵PID:4000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4268 -ip 42681⤵PID:4328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3248 -ip 32481⤵PID:3112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\mdde\sexwh.exeFilesize
357KB
MD56adff82e37aadb238d58699f857e5f8b
SHA1f779cdc5c8d6a8595a0850cb8fb7097e4f74f66d
SHA2562acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec
SHA512e9edae21aa6708690ed8a7df2555e48121677d43f3994f2407ca4ead9ac775a02cb73e367830c9cd8f49587e43a7c5a546cc400c5a46ce00e9fef81f3fb4eb96
-
C:\ProgramData\mdde\sexwh.exeFilesize
357KB
MD56adff82e37aadb238d58699f857e5f8b
SHA1f779cdc5c8d6a8595a0850cb8fb7097e4f74f66d
SHA2562acd7bc3c78edc1630e17dd81edbccb0434e83d7100f08fcd4b4b6e0df9cb6ec
SHA512e9edae21aa6708690ed8a7df2555e48121677d43f3994f2407ca4ead9ac775a02cb73e367830c9cd8f49587e43a7c5a546cc400c5a46ce00e9fef81f3fb4eb96
-
memory/3248-130-0x0000000000DFA000-0x0000000000E01000-memory.dmpFilesize
28KB
-
memory/3248-131-0x0000000000DFA000-0x0000000000E01000-memory.dmpFilesize
28KB
-
memory/3248-132-0x0000000002970000-0x0000000002979000-memory.dmpFilesize
36KB
-
memory/3248-133-0x0000000000400000-0x0000000000C33000-memory.dmpFilesize
8.2MB
-
memory/4268-136-0x0000000000F95000-0x0000000000F9B000-memory.dmpFilesize
24KB
-
memory/4268-137-0x0000000000F95000-0x0000000000F9B000-memory.dmpFilesize
24KB
-
memory/4268-138-0x0000000000D80000-0x0000000000D89000-memory.dmpFilesize
36KB
-
memory/4268-139-0x0000000000400000-0x0000000000C33000-memory.dmpFilesize
8.2MB