Analysis
-
max time kernel
111s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-11-2022 08:46
Static task
static1
Behavioral task
behavioral1
Sample
80750ddfb5cfe9eb8e2adac60f372534.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
80750ddfb5cfe9eb8e2adac60f372534.exe
Resource
win10v2004-20220901-en
General
-
Target
80750ddfb5cfe9eb8e2adac60f372534.exe
-
Size
4.8MB
-
MD5
80750ddfb5cfe9eb8e2adac60f372534
-
SHA1
a720efe2b3ef7735efd77de698a5576b36068d07
-
SHA256
876e6f8cecf5d23d21e11a3a459357c763807614ba7d4ecee9c0537b5936da04
-
SHA512
bf4100fc99282c91ec03c8c234d320321e21e5e4120c45c2cd5cfeaffcf07d4e67143e61407b570448bea16b44ed0bf7ad720e61ca2ae5d30d804c5fc8266d6f
-
SSDEEP
49152:RAM2vrGxtRJHHc1RmqAhaShRgdGMYYqWxvdTBB0IEqYjla27EdS5g+A:mMgGxtU1RmqA3xsquvPEdZi+A
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
svcupdater.exepid Process 568 svcupdater.exe -
Loads dropped DLL 2 IoCs
Processes:
taskeng.exepid Process 1020 taskeng.exe 1020 taskeng.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
GoLang User-Agent 2 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 3 Go-http-client/1.1 HTTP User-Agent header 4 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
80750ddfb5cfe9eb8e2adac60f372534.execmd.exetaskeng.exedescription pid Process procid_target PID 1200 wrote to memory of 832 1200 80750ddfb5cfe9eb8e2adac60f372534.exe 27 PID 1200 wrote to memory of 832 1200 80750ddfb5cfe9eb8e2adac60f372534.exe 27 PID 1200 wrote to memory of 832 1200 80750ddfb5cfe9eb8e2adac60f372534.exe 27 PID 832 wrote to memory of 2024 832 cmd.exe 29 PID 832 wrote to memory of 2024 832 cmd.exe 29 PID 832 wrote to memory of 2024 832 cmd.exe 29 PID 1020 wrote to memory of 568 1020 taskeng.exe 31 PID 1020 wrote to memory of 568 1020 taskeng.exe 31 PID 1020 wrote to memory of 568 1020 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\80750ddfb5cfe9eb8e2adac60f372534.exe"C:\Users\Admin\AppData\Local\Temp\80750ddfb5cfe9eb8e2adac60f372534.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\cmd.execmd.exe "/C schtasks /create /tn \kBqZwNWVQe /tr \"C:\Users\Admin\AppData\Roaming\kBqZwNWVQe\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"2⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\system32\schtasks.exeschtasks /create /tn \kBqZwNWVQe /tr \"C:\Users\Admin\AppData\Roaming\kBqZwNWVQe\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"3⤵
- Creates scheduled task(s)
PID:2024
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C2C1E2BA-8519-409F-B120-7F0F1F92BA25} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Roaming\kBqZwNWVQe\svcupdater.exeC:\Users\Admin\AppData\Roaming\kBqZwNWVQe\svcupdater.exe2⤵
- Executes dropped EXE
PID:568
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD580750ddfb5cfe9eb8e2adac60f372534
SHA1a720efe2b3ef7735efd77de698a5576b36068d07
SHA256876e6f8cecf5d23d21e11a3a459357c763807614ba7d4ecee9c0537b5936da04
SHA512bf4100fc99282c91ec03c8c234d320321e21e5e4120c45c2cd5cfeaffcf07d4e67143e61407b570448bea16b44ed0bf7ad720e61ca2ae5d30d804c5fc8266d6f
-
Filesize
4.8MB
MD580750ddfb5cfe9eb8e2adac60f372534
SHA1a720efe2b3ef7735efd77de698a5576b36068d07
SHA256876e6f8cecf5d23d21e11a3a459357c763807614ba7d4ecee9c0537b5936da04
SHA512bf4100fc99282c91ec03c8c234d320321e21e5e4120c45c2cd5cfeaffcf07d4e67143e61407b570448bea16b44ed0bf7ad720e61ca2ae5d30d804c5fc8266d6f
-
Filesize
4.8MB
MD580750ddfb5cfe9eb8e2adac60f372534
SHA1a720efe2b3ef7735efd77de698a5576b36068d07
SHA256876e6f8cecf5d23d21e11a3a459357c763807614ba7d4ecee9c0537b5936da04
SHA512bf4100fc99282c91ec03c8c234d320321e21e5e4120c45c2cd5cfeaffcf07d4e67143e61407b570448bea16b44ed0bf7ad720e61ca2ae5d30d804c5fc8266d6f
-
Filesize
4.8MB
MD580750ddfb5cfe9eb8e2adac60f372534
SHA1a720efe2b3ef7735efd77de698a5576b36068d07
SHA256876e6f8cecf5d23d21e11a3a459357c763807614ba7d4ecee9c0537b5936da04
SHA512bf4100fc99282c91ec03c8c234d320321e21e5e4120c45c2cd5cfeaffcf07d4e67143e61407b570448bea16b44ed0bf7ad720e61ca2ae5d30d804c5fc8266d6f