Analysis
-
max time kernel
97s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
18-04-2022 13:26
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
tmp.exe
-
Size
239KB
-
MD5
546a938a34280d863ba416c0aacdb04e
-
SHA1
824f329cb115c4411d9651b029571f4759ac842e
-
SHA256
d0f3211e3a351e4f7384243f983a33a0b4e989b61fea1e1c098bb5c8241ae102
-
SHA512
46daabd195d7f5aa05a1345b5dcbc442388797348d2042e8ad3abc918a87467fca21dba2192e3c90d53984592ded2d6affb0d442b63bde5929a477ba51852287
Malware Config
Extracted
Family
systembc
C2
62.182.82.33:1488
usaf.army:1488
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
tmp.exedescription ioc process File opened for modification C:\Windows\Tasks\wow64.job tmp.exe File created C:\Windows\Tasks\wow64.job tmp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1288 wrote to memory of 2032 1288 taskeng.exe tmp.exe PID 1288 wrote to memory of 2032 1288 taskeng.exe tmp.exe PID 1288 wrote to memory of 2032 1288 taskeng.exe tmp.exe PID 1288 wrote to memory of 2032 1288 taskeng.exe tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Drops file in Windows directory
PID:2016
-
C:\Windows\system32\taskeng.exetaskeng.exe {19BD68C2-AE3B-4899-BB21-6287D3693A7D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe start2⤵PID:2032
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2016-54-0x00000000005EF000-0x00000000005F8000-memory.dmpFilesize
36KB
-
memory/2016-55-0x0000000075F21000-0x0000000075F23000-memory.dmpFilesize
8KB
-
memory/2016-56-0x00000000005EF000-0x00000000005F8000-memory.dmpFilesize
36KB
-
memory/2016-57-0x0000000000220000-0x0000000000225000-memory.dmpFilesize
20KB
-
memory/2016-58-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/2032-59-0x0000000000000000-mapping.dmp
-
memory/2032-60-0x00000000004DF000-0x00000000004E8000-memory.dmpFilesize
36KB
-
memory/2032-62-0x00000000004DF000-0x00000000004E8000-memory.dmpFilesize
36KB
-
memory/2032-63-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB