Analysis
-
max time kernel
110s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2022 14:52
Static task
static1
Behavioral task
behavioral1
Sample
6738634d9b3bfcf7ebca8be48c091b3e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6738634d9b3bfcf7ebca8be48c091b3e.exe
Resource
win10v2004-20220812-en
General
-
Target
6738634d9b3bfcf7ebca8be48c091b3e.exe
-
Size
4MB
-
MD5
6738634d9b3bfcf7ebca8be48c091b3e
-
SHA1
f08091a4b3f5c167bcdfa565584bed8ed2a69f0c
-
SHA256
8c77759eff69330a5c9697d05e2a0f99c6edff904bdd52a048df0461d0459b27
-
SHA512
c8e6f3dd4c7de4c9a54278a398d096aabf8391a8a92484eb2a8e74d6d288d8b066e967916645e2aaec53fb4c8c3ac9f1cbd0fc01c1b828a1a742af3bc57aaaf5
-
SSDEEP
49152:cAMzHHGxBRJHrcFFmJAhaShRgxuMY8qa9vjTIt0IEqYjla27/BS5g+A:bMjGxBQFFmJA3Foq+vOEdZZ+A
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
svcupdater.exepid process 5060 svcupdater.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
GoLang User-Agent 2 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 27 Go-http-client/1.1 HTTP User-Agent header 51 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
6738634d9b3bfcf7ebca8be48c091b3e.execmd.exedescription pid process target process PID 4500 wrote to memory of 4100 4500 6738634d9b3bfcf7ebca8be48c091b3e.exe cmd.exe PID 4500 wrote to memory of 4100 4500 6738634d9b3bfcf7ebca8be48c091b3e.exe cmd.exe PID 4100 wrote to memory of 3532 4100 cmd.exe schtasks.exe PID 4100 wrote to memory of 3532 4100 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6738634d9b3bfcf7ebca8be48c091b3e.exe"C:\Users\Admin\AppData\Local\Temp\6738634d9b3bfcf7ebca8be48c091b3e.exe"Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd.exe "/C schtasks /create /tn \ipXroBUdMG /tr \"C:\Users\Admin\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /tn \ipXroBUdMG /tr \"C:\Users\Admin\AppData\Roaming\ipXroBUdMG\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\ipXroBUdMG\svcupdater.exeC:\Users\Admin\AppData\Roaming\ipXroBUdMG\svcupdater.exeExecutes dropped EXE
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Scheduled Task
1Privilege Escalation
Replay Monitor
Downloads
-
C:\Users\Admin\AppData\Roaming\ipXroBUdMG\svcupdater.exeFilesize
4MB
MD56738634d9b3bfcf7ebca8be48c091b3e
SHA1f08091a4b3f5c167bcdfa565584bed8ed2a69f0c
SHA2568c77759eff69330a5c9697d05e2a0f99c6edff904bdd52a048df0461d0459b27
SHA512c8e6f3dd4c7de4c9a54278a398d096aabf8391a8a92484eb2a8e74d6d288d8b066e967916645e2aaec53fb4c8c3ac9f1cbd0fc01c1b828a1a742af3bc57aaaf5
-
C:\Users\Admin\AppData\Roaming\ipXroBUdMG\svcupdater.exeFilesize
4MB
MD56738634d9b3bfcf7ebca8be48c091b3e
SHA1f08091a4b3f5c167bcdfa565584bed8ed2a69f0c
SHA2568c77759eff69330a5c9697d05e2a0f99c6edff904bdd52a048df0461d0459b27
SHA512c8e6f3dd4c7de4c9a54278a398d096aabf8391a8a92484eb2a8e74d6d288d8b066e967916645e2aaec53fb4c8c3ac9f1cbd0fc01c1b828a1a742af3bc57aaaf5
-
memory/3532-133-0x0000000000000000-mapping.dmp
-
memory/4100-132-0x0000000000000000-mapping.dmp