Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2022, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
7880b2cd5384bf7c1c094d871947504df1eef7f29befa93fec72bbafc4fa8fa8.exe
Resource
win7-20220812-en
General
-
Target
7880b2cd5384bf7c1c094d871947504df1eef7f29befa93fec72bbafc4fa8fa8.exe
-
Size
250KB
-
MD5
a2235dca8dc46a22f9be08fedc7b1b0a
-
SHA1
9071d6d0cd331694ffb6b1caedf8b49de4728d70
-
SHA256
7880b2cd5384bf7c1c094d871947504df1eef7f29befa93fec72bbafc4fa8fa8
-
SHA512
ea3b517af5d1c93f6e020116259f5a550f4e00614d54ee43a784b1ffa0be767bd6d36e72328079a4b634d92a45f63f27796a9d51357114356174d0845d624a4b
-
SSDEEP
6144:Y6qM6mqNbnX+cd8rgyzZ/zNwZuX80fMBZ009:BemqxnX+cd8rgOhquX80fMBZV9
Malware Config
Extracted
systembc
146.70.101.95:4001
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3044 pjhak.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\pjhak.job 7880b2cd5384bf7c1c094d871947504df1eef7f29befa93fec72bbafc4fa8fa8.exe File opened for modification C:\Windows\Tasks\pjhak.job 7880b2cd5384bf7c1c094d871947504df1eef7f29befa93fec72bbafc4fa8fa8.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1880 5104 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5104 7880b2cd5384bf7c1c094d871947504df1eef7f29befa93fec72bbafc4fa8fa8.exe 5104 7880b2cd5384bf7c1c094d871947504df1eef7f29befa93fec72bbafc4fa8fa8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7880b2cd5384bf7c1c094d871947504df1eef7f29befa93fec72bbafc4fa8fa8.exe"C:\Users\Admin\AppData\Local\Temp\7880b2cd5384bf7c1c094d871947504df1eef7f29befa93fec72bbafc4fa8fa8.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:5104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 4922⤵
- Program crash
PID:1880
-
-
C:\ProgramData\bpipem\pjhak.exeC:\ProgramData\bpipem\pjhak.exe start1⤵
- Executes dropped EXE
PID:3044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5104 -ip 51041⤵PID:4304
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD5a2235dca8dc46a22f9be08fedc7b1b0a
SHA19071d6d0cd331694ffb6b1caedf8b49de4728d70
SHA2567880b2cd5384bf7c1c094d871947504df1eef7f29befa93fec72bbafc4fa8fa8
SHA512ea3b517af5d1c93f6e020116259f5a550f4e00614d54ee43a784b1ffa0be767bd6d36e72328079a4b634d92a45f63f27796a9d51357114356174d0845d624a4b
-
Filesize
250KB
MD5a2235dca8dc46a22f9be08fedc7b1b0a
SHA19071d6d0cd331694ffb6b1caedf8b49de4728d70
SHA2567880b2cd5384bf7c1c094d871947504df1eef7f29befa93fec72bbafc4fa8fa8
SHA512ea3b517af5d1c93f6e020116259f5a550f4e00614d54ee43a784b1ffa0be767bd6d36e72328079a4b634d92a45f63f27796a9d51357114356174d0845d624a4b