Analysis
-
max time kernel
127s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22-06-2022 13:31
Static task
static1
Behavioral task
behavioral1
Sample
2dd3e669bd3b9727e7b744198c7ad0399a89c5e4287f8572fb9f19aaca93c961.exe
Resource
win7-20220414-en
General
-
Target
2dd3e669bd3b9727e7b744198c7ad0399a89c5e4287f8572fb9f19aaca93c961.exe
-
Size
289KB
-
MD5
375389bf695377358b96e03c5b091a6e
-
SHA1
c03751ce0025d329fc07c604d41cda77c03858b3
-
SHA256
2dd3e669bd3b9727e7b744198c7ad0399a89c5e4287f8572fb9f19aaca93c961
-
SHA512
4c34f930fa6cc6eca979fb0b1d94384398f21674a93164a76825eff2b1e8a249534c941177920d4ca81defa4fc130e897a958e472185341354293ac7416bd30f
Malware Config
Extracted
systembc
mdadvertx17.xyz:4044
pkspacex19.xyz:4044
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
tdifdm.exepid process 856 tdifdm.exe -
Drops file in Windows directory 2 IoCs
Processes:
2dd3e669bd3b9727e7b744198c7ad0399a89c5e4287f8572fb9f19aaca93c961.exedescription ioc process File created C:\Windows\Tasks\tdifdm.job 2dd3e669bd3b9727e7b744198c7ad0399a89c5e4287f8572fb9f19aaca93c961.exe File opened for modification C:\Windows\Tasks\tdifdm.job 2dd3e669bd3b9727e7b744198c7ad0399a89c5e4287f8572fb9f19aaca93c961.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
2dd3e669bd3b9727e7b744198c7ad0399a89c5e4287f8572fb9f19aaca93c961.exepid process 1972 2dd3e669bd3b9727e7b744198c7ad0399a89c5e4287f8572fb9f19aaca93c961.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1368 wrote to memory of 856 1368 taskeng.exe tdifdm.exe PID 1368 wrote to memory of 856 1368 taskeng.exe tdifdm.exe PID 1368 wrote to memory of 856 1368 taskeng.exe tdifdm.exe PID 1368 wrote to memory of 856 1368 taskeng.exe tdifdm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dd3e669bd3b9727e7b744198c7ad0399a89c5e4287f8572fb9f19aaca93c961.exe"C:\Users\Admin\AppData\Local\Temp\2dd3e669bd3b9727e7b744198c7ad0399a89c5e4287f8572fb9f19aaca93c961.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\taskeng.exetaskeng.exe {6FF2F842-31EF-41E2-96F9-3F49B95C12E9} S-1-5-21-2277218442-1199762539-2004043321-1000:AUVQQRRF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\uskkepe\tdifdm.exeC:\ProgramData\uskkepe\tdifdm.exe start22⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\uskkepe\tdifdm.exeFilesize
289KB
MD5375389bf695377358b96e03c5b091a6e
SHA1c03751ce0025d329fc07c604d41cda77c03858b3
SHA2562dd3e669bd3b9727e7b744198c7ad0399a89c5e4287f8572fb9f19aaca93c961
SHA5124c34f930fa6cc6eca979fb0b1d94384398f21674a93164a76825eff2b1e8a249534c941177920d4ca81defa4fc130e897a958e472185341354293ac7416bd30f
-
C:\ProgramData\uskkepe\tdifdm.exeFilesize
289KB
MD5375389bf695377358b96e03c5b091a6e
SHA1c03751ce0025d329fc07c604d41cda77c03858b3
SHA2562dd3e669bd3b9727e7b744198c7ad0399a89c5e4287f8572fb9f19aaca93c961
SHA5124c34f930fa6cc6eca979fb0b1d94384398f21674a93164a76825eff2b1e8a249534c941177920d4ca81defa4fc130e897a958e472185341354293ac7416bd30f
-
memory/856-60-0x0000000000000000-mapping.dmp
-
memory/856-63-0x00000000004FA000-0x0000000000500000-memory.dmpFilesize
24KB
-
memory/856-64-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/1972-54-0x0000000076721000-0x0000000076723000-memory.dmpFilesize
8KB
-
memory/1972-56-0x0000000000020000-0x0000000000029000-memory.dmpFilesize
36KB
-
memory/1972-55-0x00000000002EA000-0x00000000002F0000-memory.dmpFilesize
24KB
-
memory/1972-57-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/1972-58-0x00000000002EA000-0x00000000002F0000-memory.dmpFilesize
24KB