Analysis
-
max time kernel
188s -
max time network
205s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-05-2022 20:33
Static task
static1
Behavioral task
behavioral1
Sample
dcf55c3817c98cb1b0092311f51d10154f501349611a8dcea2267c0424b935e6.exe
Resource
win7-20220414-en
General
-
Target
dcf55c3817c98cb1b0092311f51d10154f501349611a8dcea2267c0424b935e6.exe
-
Size
997KB
-
MD5
47d94d73ed4ccd6a310a1527f47fcd8f
-
SHA1
b229b65f8df84b82672fc7cc2777712adb739662
-
SHA256
dcf55c3817c98cb1b0092311f51d10154f501349611a8dcea2267c0424b935e6
-
SHA512
19244662bc12f11f37437a09715d180b7d436309a4c186db84fdb4b331e6e8862dbe7da8143ac16ecd671ff7412244bd5eb66816b9eacd5cfd3b0f7418171b54
Malware Config
Extracted
systembc
185.33.84.190:4124
45.79.237.92:4124
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
bhtlj.exepid process 1284 bhtlj.exe -
Drops file in Windows directory 2 IoCs
Processes:
dcf55c3817c98cb1b0092311f51d10154f501349611a8dcea2267c0424b935e6.exedescription ioc process File created C:\Windows\Tasks\bhtlj.job dcf55c3817c98cb1b0092311f51d10154f501349611a8dcea2267c0424b935e6.exe File opened for modification C:\Windows\Tasks\bhtlj.job dcf55c3817c98cb1b0092311f51d10154f501349611a8dcea2267c0424b935e6.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
dcf55c3817c98cb1b0092311f51d10154f501349611a8dcea2267c0424b935e6.exepid process 652 dcf55c3817c98cb1b0092311f51d10154f501349611a8dcea2267c0424b935e6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1208 wrote to memory of 1284 1208 taskeng.exe bhtlj.exe PID 1208 wrote to memory of 1284 1208 taskeng.exe bhtlj.exe PID 1208 wrote to memory of 1284 1208 taskeng.exe bhtlj.exe PID 1208 wrote to memory of 1284 1208 taskeng.exe bhtlj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcf55c3817c98cb1b0092311f51d10154f501349611a8dcea2267c0424b935e6.exe"C:\Users\Admin\AppData\Local\Temp\dcf55c3817c98cb1b0092311f51d10154f501349611a8dcea2267c0424b935e6.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\taskeng.exetaskeng.exe {C81B668D-D04C-4460-AD0F-701B4ACC3C45} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\tabif\bhtlj.exeC:\ProgramData\tabif\bhtlj.exe start2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\tabif\bhtlj.exeFilesize
997KB
MD547d94d73ed4ccd6a310a1527f47fcd8f
SHA1b229b65f8df84b82672fc7cc2777712adb739662
SHA256dcf55c3817c98cb1b0092311f51d10154f501349611a8dcea2267c0424b935e6
SHA51219244662bc12f11f37437a09715d180b7d436309a4c186db84fdb4b331e6e8862dbe7da8143ac16ecd671ff7412244bd5eb66816b9eacd5cfd3b0f7418171b54
-
C:\ProgramData\tabif\bhtlj.exeFilesize
997KB
MD547d94d73ed4ccd6a310a1527f47fcd8f
SHA1b229b65f8df84b82672fc7cc2777712adb739662
SHA256dcf55c3817c98cb1b0092311f51d10154f501349611a8dcea2267c0424b935e6
SHA51219244662bc12f11f37437a09715d180b7d436309a4c186db84fdb4b331e6e8862dbe7da8143ac16ecd671ff7412244bd5eb66816b9eacd5cfd3b0f7418171b54
-
memory/652-54-0x00000000765F1000-0x00000000765F3000-memory.dmpFilesize
8KB
-
memory/652-55-0x0000000000220000-0x0000000000262000-memory.dmpFilesize
264KB
-
memory/652-56-0x0000000000400000-0x0000000000502000-memory.dmpFilesize
1.0MB
-
memory/1284-58-0x0000000000000000-mapping.dmp
-
memory/1284-61-0x0000000000400000-0x0000000000502000-memory.dmpFilesize
1.0MB