Analysis
-
max time kernel
75s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-09-2022 18:18
Static task
static1
Behavioral task
behavioral1
Sample
00778e3e3f4a1557362c2682446b6b38.exe
Resource
win7-20220812-en
General
-
Target
00778e3e3f4a1557362c2682446b6b38.exe
-
Size
249KB
-
MD5
00778e3e3f4a1557362c2682446b6b38
-
SHA1
1b2d6e4260b487f13021361dbb59b023a6a0cc87
-
SHA256
873a028cd3d8f457b4f7b8036afbc736466eade13f229b92ae4d9c67815da376
-
SHA512
1a414bc81ac413ef60827d18b0ad6ada1232624f12d1bb75db95f139f82ba9c4fba580159ab936ed3bca355496844f561a2e124d225aa6a97571cb1ccb0f5dee
-
SSDEEP
3072:RXMw7t3+kIazg6rLO75fuC55rfcvMCsJnbl3J0KX+fSM/h3BsxkgaBChURb:1x3RI+g6rLOtum3J0RSniga
Malware Config
Extracted
systembc
146.70.101.95:4001
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
axeombl.exepid process 1744 axeombl.exe -
Drops file in Windows directory 2 IoCs
Processes:
00778e3e3f4a1557362c2682446b6b38.exedescription ioc process File created C:\Windows\Tasks\axeombl.job 00778e3e3f4a1557362c2682446b6b38.exe File opened for modification C:\Windows\Tasks\axeombl.job 00778e3e3f4a1557362c2682446b6b38.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
00778e3e3f4a1557362c2682446b6b38.exepid process 1388 00778e3e3f4a1557362c2682446b6b38.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1352 wrote to memory of 1744 1352 taskeng.exe axeombl.exe PID 1352 wrote to memory of 1744 1352 taskeng.exe axeombl.exe PID 1352 wrote to memory of 1744 1352 taskeng.exe axeombl.exe PID 1352 wrote to memory of 1744 1352 taskeng.exe axeombl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\00778e3e3f4a1557362c2682446b6b38.exe"C:\Users\Admin\AppData\Local\Temp\00778e3e3f4a1557362c2682446b6b38.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\taskeng.exetaskeng.exe {04FA8D7F-2642-463E-9053-A34925692CC1} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\gtue\axeombl.exeC:\ProgramData\gtue\axeombl.exe start2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\gtue\axeombl.exeFilesize
249KB
MD500778e3e3f4a1557362c2682446b6b38
SHA11b2d6e4260b487f13021361dbb59b023a6a0cc87
SHA256873a028cd3d8f457b4f7b8036afbc736466eade13f229b92ae4d9c67815da376
SHA5121a414bc81ac413ef60827d18b0ad6ada1232624f12d1bb75db95f139f82ba9c4fba580159ab936ed3bca355496844f561a2e124d225aa6a97571cb1ccb0f5dee
-
C:\ProgramData\gtue\axeombl.exeFilesize
249KB
MD500778e3e3f4a1557362c2682446b6b38
SHA11b2d6e4260b487f13021361dbb59b023a6a0cc87
SHA256873a028cd3d8f457b4f7b8036afbc736466eade13f229b92ae4d9c67815da376
SHA5121a414bc81ac413ef60827d18b0ad6ada1232624f12d1bb75db95f139f82ba9c4fba580159ab936ed3bca355496844f561a2e124d225aa6a97571cb1ccb0f5dee
-
memory/1388-54-0x00000000768A1000-0x00000000768A3000-memory.dmpFilesize
8KB
-
memory/1388-55-0x000000000063E000-0x000000000064E000-memory.dmpFilesize
64KB
-
memory/1388-56-0x0000000000220000-0x0000000000229000-memory.dmpFilesize
36KB
-
memory/1388-57-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/1744-59-0x0000000000000000-mapping.dmp
-
memory/1744-62-0x00000000002EE000-0x00000000002FE000-memory.dmpFilesize
64KB
-
memory/1744-63-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB