Analysis
-
max time kernel
61s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
05-05-2022 14:42
Static task
static1
Behavioral task
behavioral1
Sample
7b7328a020bf16f8a3915f1a0b4e7ecb.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
7b7328a020bf16f8a3915f1a0b4e7ecb.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
7b7328a020bf16f8a3915f1a0b4e7ecb.exe
-
Size
13KB
-
MD5
7b7328a020bf16f8a3915f1a0b4e7ecb
-
SHA1
dd3636d4d11c4a1b9618622cbf758c18dd89cffa
-
SHA256
e2cc138b0051fc6d2dce76941e2190d964c51754dac13705f63dad2941ccbba7
-
SHA512
cae2e70cc0e380f3d3cf50689ec36db97559bd9726c97c9b7016b05297f060c456e0e24a9e518eda258f9bdf999a760077946ff7755040ad5cb007768630f053
Score
10/10
Malware Config
Signatures
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Drops file in Windows directory 2 IoCs
Processes:
7b7328a020bf16f8a3915f1a0b4e7ecb.exedescription ioc process File created C:\Windows\Tasks\wow64.job 7b7328a020bf16f8a3915f1a0b4e7ecb.exe File opened for modification C:\Windows\Tasks\wow64.job 7b7328a020bf16f8a3915f1a0b4e7ecb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 868 wrote to memory of 904 868 taskeng.exe 7b7328a020bf16f8a3915f1a0b4e7ecb.exe PID 868 wrote to memory of 904 868 taskeng.exe 7b7328a020bf16f8a3915f1a0b4e7ecb.exe PID 868 wrote to memory of 904 868 taskeng.exe 7b7328a020bf16f8a3915f1a0b4e7ecb.exe PID 868 wrote to memory of 904 868 taskeng.exe 7b7328a020bf16f8a3915f1a0b4e7ecb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b7328a020bf16f8a3915f1a0b4e7ecb.exe"C:\Users\Admin\AppData\Local\Temp\7b7328a020bf16f8a3915f1a0b4e7ecb.exe"1⤵
- Drops file in Windows directory
-
C:\Windows\system32\taskeng.exetaskeng.exe {458E4F8D-D453-44B5-9EF4-00E9074F635E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7b7328a020bf16f8a3915f1a0b4e7ecb.exeC:\Users\Admin\AppData\Local\Temp\7b7328a020bf16f8a3915f1a0b4e7ecb.exe start2⤵