Analysis
-
max time kernel
101s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2023 15:35
Static task
static1
Behavioral task
behavioral1
Sample
f89d628342ab6b02fb4e43b0959cffad.exe
Resource
win7-20221111-en
General
-
Target
f89d628342ab6b02fb4e43b0959cffad.exe
-
Size
185KB
-
MD5
f89d628342ab6b02fb4e43b0959cffad
-
SHA1
ef346df6771087873a820f92c595d2ef42de4958
-
SHA256
3552afca2214180166dc53afd3588fc9de44e7bf5cf034d2622634ec53ffbd35
-
SHA512
65b7f3e89743f4937fba80bc2f535a74578d6c72377e041ff3a6bb642672b576de54c6c92e2fe35f8cb59278474d19d391f5593644aef0353f2896a4a175946d
-
SSDEEP
3072:t3USMV1WhtLYjE4QW5QNSmkKkb5fn/4pOSPCizVgrR4xWFZw/ZS7rsG:rMWLYjE7kCOuzVgV4m
Malware Config
Extracted
systembc
109.205.214.18:443
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
kthjg.exepid process 1272 kthjg.exe -
Drops file in Windows directory 2 IoCs
Processes:
f89d628342ab6b02fb4e43b0959cffad.exedescription ioc process File created C:\Windows\Tasks\kthjg.job f89d628342ab6b02fb4e43b0959cffad.exe File opened for modification C:\Windows\Tasks\kthjg.job f89d628342ab6b02fb4e43b0959cffad.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1708 1300 WerFault.exe f89d628342ab6b02fb4e43b0959cffad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f89d628342ab6b02fb4e43b0959cffad.exepid process 1300 f89d628342ab6b02fb4e43b0959cffad.exe 1300 f89d628342ab6b02fb4e43b0959cffad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f89d628342ab6b02fb4e43b0959cffad.exe"C:\Users\Admin\AppData\Local\Temp\f89d628342ab6b02fb4e43b0959cffad.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1300 -s 9602⤵
- Program crash
-
C:\ProgramData\nnmxiu\kthjg.exeC:\ProgramData\nnmxiu\kthjg.exe start1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1300 -ip 13001⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\nnmxiu\kthjg.exeFilesize
185KB
MD5f89d628342ab6b02fb4e43b0959cffad
SHA1ef346df6771087873a820f92c595d2ef42de4958
SHA2563552afca2214180166dc53afd3588fc9de44e7bf5cf034d2622634ec53ffbd35
SHA51265b7f3e89743f4937fba80bc2f535a74578d6c72377e041ff3a6bb642672b576de54c6c92e2fe35f8cb59278474d19d391f5593644aef0353f2896a4a175946d
-
C:\ProgramData\nnmxiu\kthjg.exeFilesize
185KB
MD5f89d628342ab6b02fb4e43b0959cffad
SHA1ef346df6771087873a820f92c595d2ef42de4958
SHA2563552afca2214180166dc53afd3588fc9de44e7bf5cf034d2622634ec53ffbd35
SHA51265b7f3e89743f4937fba80bc2f535a74578d6c72377e041ff3a6bb642672b576de54c6c92e2fe35f8cb59278474d19d391f5593644aef0353f2896a4a175946d
-
memory/1272-138-0x00000000005C8000-0x00000000005D8000-memory.dmpFilesize
64KB
-
memory/1272-139-0x0000000000400000-0x0000000000464000-memory.dmpFilesize
400KB
-
memory/1272-140-0x00000000005C8000-0x00000000005D8000-memory.dmpFilesize
64KB
-
memory/1300-133-0x0000000000600000-0x0000000000609000-memory.dmpFilesize
36KB
-
memory/1300-134-0x0000000000400000-0x0000000000464000-memory.dmpFilesize
400KB
-
memory/1300-132-0x000000000069D000-0x00000000006AE000-memory.dmpFilesize
68KB
-
memory/1300-135-0x000000000069D000-0x00000000006AE000-memory.dmpFilesize
68KB
-
memory/1300-141-0x000000000069D000-0x00000000006AE000-memory.dmpFilesize
68KB