Analysis
-
max time kernel
110s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2022 14:52
Static task
static1
Behavioral task
behavioral1
Sample
6738634d9b3bfcf7ebca8be48c091b3e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6738634d9b3bfcf7ebca8be48c091b3e.exe
Resource
win10v2004-20220812-en
General
-
Target
6738634d9b3bfcf7ebca8be48c091b3e.exe
-
Size
4.8MB
-
MD5
6738634d9b3bfcf7ebca8be48c091b3e
-
SHA1
f08091a4b3f5c167bcdfa565584bed8ed2a69f0c
-
SHA256
8c77759eff69330a5c9697d05e2a0f99c6edff904bdd52a048df0461d0459b27
-
SHA512
c8e6f3dd4c7de4c9a54278a398d096aabf8391a8a92484eb2a8e74d6d288d8b066e967916645e2aaec53fb4c8c3ac9f1cbd0fc01c1b828a1a742af3bc57aaaf5
-
SSDEEP
49152:cAMzHHGxBRJHrcFFmJAhaShRgxuMY8qa9vjTIt0IEqYjla27/BS5g+A:bMjGxBQFFmJA3Foq+vOEdZZ+A
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5060 svcupdater.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3532 schtasks.exe -
GoLang User-Agent 2 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 27 Go-http-client/1.1 HTTP User-Agent header 51 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4500 wrote to memory of 4100 4500 6738634d9b3bfcf7ebca8be48c091b3e.exe 79 PID 4500 wrote to memory of 4100 4500 6738634d9b3bfcf7ebca8be48c091b3e.exe 79 PID 4100 wrote to memory of 3532 4100 cmd.exe 81 PID 4100 wrote to memory of 3532 4100 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\6738634d9b3bfcf7ebca8be48c091b3e.exe"C:\Users\Admin\AppData\Local\Temp\6738634d9b3bfcf7ebca8be48c091b3e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\system32\cmd.execmd.exe "/C schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\Admin\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"2⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\system32\schtasks.exeschtasks /create /tn \ipXroBUdMG /tr \"C:\Users\Admin\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"3⤵
- Creates scheduled task(s)
PID:3532
-
-
-
C:\Users\Admin\AppData\Roaming\ipXroBUdMG\svcupdater.exeC:\Users\Admin\AppData\Roaming\ipXroBUdMG\svcupdater.exe1⤵
- Executes dropped EXE
PID:5060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD56738634d9b3bfcf7ebca8be48c091b3e
SHA1f08091a4b3f5c167bcdfa565584bed8ed2a69f0c
SHA2568c77759eff69330a5c9697d05e2a0f99c6edff904bdd52a048df0461d0459b27
SHA512c8e6f3dd4c7de4c9a54278a398d096aabf8391a8a92484eb2a8e74d6d288d8b066e967916645e2aaec53fb4c8c3ac9f1cbd0fc01c1b828a1a742af3bc57aaaf5
-
Filesize
4.8MB
MD56738634d9b3bfcf7ebca8be48c091b3e
SHA1f08091a4b3f5c167bcdfa565584bed8ed2a69f0c
SHA2568c77759eff69330a5c9697d05e2a0f99c6edff904bdd52a048df0461d0459b27
SHA512c8e6f3dd4c7de4c9a54278a398d096aabf8391a8a92484eb2a8e74d6d288d8b066e967916645e2aaec53fb4c8c3ac9f1cbd0fc01c1b828a1a742af3bc57aaaf5