Analysis
-
max time kernel
202s -
max time network
220s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-05-2022 11:43
Static task
static1
Behavioral task
behavioral1
Sample
5c947115e5de28bf753bdf423b76cec09ab76f339c62058392b603391cbf461f.exe
Resource
win7-20220414-en
General
-
Target
5c947115e5de28bf753bdf423b76cec09ab76f339c62058392b603391cbf461f.exe
-
Size
247KB
-
MD5
aa00750f0df31493289bf07719cefd5e
-
SHA1
3c5b53cea10a28b955d1224ec2d293c639874593
-
SHA256
5c947115e5de28bf753bdf423b76cec09ab76f339c62058392b603391cbf461f
-
SHA512
cc679227e4e137885cfbf475e89f5832cbb3009b2e95aba661b6f2c973bc56672480e3c695daca6acf825fafcc8bc7e667ab92eb81da2d1aeb7d66deb55d7704
Malware Config
Extracted
systembc
217.8.117.114:4062
213.159.213.225:4062
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
dxnbbe.exepid process 1324 dxnbbe.exe -
Drops file in Windows directory 2 IoCs
Processes:
5c947115e5de28bf753bdf423b76cec09ab76f339c62058392b603391cbf461f.exedescription ioc process File opened for modification C:\Windows\Tasks\dxnbbe.job 5c947115e5de28bf753bdf423b76cec09ab76f339c62058392b603391cbf461f.exe File created C:\Windows\Tasks\dxnbbe.job 5c947115e5de28bf753bdf423b76cec09ab76f339c62058392b603391cbf461f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5c947115e5de28bf753bdf423b76cec09ab76f339c62058392b603391cbf461f.exepid process 956 5c947115e5de28bf753bdf423b76cec09ab76f339c62058392b603391cbf461f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1408 wrote to memory of 1324 1408 taskeng.exe dxnbbe.exe PID 1408 wrote to memory of 1324 1408 taskeng.exe dxnbbe.exe PID 1408 wrote to memory of 1324 1408 taskeng.exe dxnbbe.exe PID 1408 wrote to memory of 1324 1408 taskeng.exe dxnbbe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c947115e5de28bf753bdf423b76cec09ab76f339c62058392b603391cbf461f.exe"C:\Users\Admin\AppData\Local\Temp\5c947115e5de28bf753bdf423b76cec09ab76f339c62058392b603391cbf461f.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\taskeng.exetaskeng.exe {BF5D225C-087D-4604-851F-43FDAC6B4977} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\bnwq\dxnbbe.exeC:\ProgramData\bnwq\dxnbbe.exe start2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\bnwq\dxnbbe.exeFilesize
247KB
MD5aa00750f0df31493289bf07719cefd5e
SHA13c5b53cea10a28b955d1224ec2d293c639874593
SHA2565c947115e5de28bf753bdf423b76cec09ab76f339c62058392b603391cbf461f
SHA512cc679227e4e137885cfbf475e89f5832cbb3009b2e95aba661b6f2c973bc56672480e3c695daca6acf825fafcc8bc7e667ab92eb81da2d1aeb7d66deb55d7704
-
C:\ProgramData\bnwq\dxnbbe.exeFilesize
247KB
MD5aa00750f0df31493289bf07719cefd5e
SHA13c5b53cea10a28b955d1224ec2d293c639874593
SHA2565c947115e5de28bf753bdf423b76cec09ab76f339c62058392b603391cbf461f
SHA512cc679227e4e137885cfbf475e89f5832cbb3009b2e95aba661b6f2c973bc56672480e3c695daca6acf825fafcc8bc7e667ab92eb81da2d1aeb7d66deb55d7704
-
memory/956-54-0x0000000075711000-0x0000000075713000-memory.dmpFilesize
8KB
-
memory/956-55-0x0000000000970000-0x0000000000980000-memory.dmpFilesize
64KB
-
memory/956-57-0x0000000077040000-0x00000000771C0000-memory.dmpFilesize
1.5MB
-
memory/956-58-0x00000000009D0000-0x00000000009DB000-memory.dmpFilesize
44KB
-
memory/1324-60-0x0000000000000000-mapping.dmp