Analysis
-
max time kernel
292s -
max time network
296s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2022 15:29
Static task
static1
Behavioral task
behavioral1
Sample
2288.exe
Resource
win7-20220901-en
General
-
Target
2288.exe
-
Size
303KB
-
MD5
a91d1ad4f99dc142a63342a79a04a61c
-
SHA1
9328310f5567fc7247516d21f339fb99b67706be
-
SHA256
2c3fade9317146109c3dad7e9e06168a2af28d04185c248a3322cd8b8ae8901f
-
SHA512
f869c9568afb90bec12732ce55552e66fe1dc2f9a52212a8011e2509805bfc59574ecbe4f52144ed8bde0b240849816cdb261ccefcb9d00f1ba65f0daa9cc39a
-
SSDEEP
3072:S7WJjr2Y4hMi7RVRypzplBot6LB1fhnYAfm8QBmP22tThsNbNweGj+Qo6hNz5/a:++js57SFlnLDfhYAfLP22tThsIeGjY6
Malware Config
Extracted
systembc
89.248.163.218:443
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
tupqk.exepid process 3908 tupqk.exe -
Drops file in Windows directory 2 IoCs
Processes:
2288.exedescription ioc process File created C:\Windows\Tasks\tupqk.job 2288.exe File opened for modification C:\Windows\Tasks\tupqk.job 2288.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3708 4716 WerFault.exe 2288.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2288.exepid process 4716 2288.exe 4716 2288.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2288.exe"C:\Users\Admin\AppData\Local\Temp\2288.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 9802⤵
- Program crash
PID:3708
-
C:\ProgramData\ikablkr\tupqk.exeC:\ProgramData\ikablkr\tupqk.exe start1⤵
- Executes dropped EXE
PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4716 -ip 47161⤵PID:4252
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303KB
MD5a91d1ad4f99dc142a63342a79a04a61c
SHA19328310f5567fc7247516d21f339fb99b67706be
SHA2562c3fade9317146109c3dad7e9e06168a2af28d04185c248a3322cd8b8ae8901f
SHA512f869c9568afb90bec12732ce55552e66fe1dc2f9a52212a8011e2509805bfc59574ecbe4f52144ed8bde0b240849816cdb261ccefcb9d00f1ba65f0daa9cc39a
-
Filesize
303KB
MD5a91d1ad4f99dc142a63342a79a04a61c
SHA19328310f5567fc7247516d21f339fb99b67706be
SHA2562c3fade9317146109c3dad7e9e06168a2af28d04185c248a3322cd8b8ae8901f
SHA512f869c9568afb90bec12732ce55552e66fe1dc2f9a52212a8011e2509805bfc59574ecbe4f52144ed8bde0b240849816cdb261ccefcb9d00f1ba65f0daa9cc39a