Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-01-2023 14:59
Static task
static1
Behavioral task
behavioral1
Sample
8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
General
-
Target
8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe
-
Size
266KB
-
MD5
63b509f4565ff9a05402b2b18083b53a
-
SHA1
a0c3ba7679a36976bbbbad6c08758054ba49af8b
-
SHA256
8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2
-
SHA512
49463bd0b39e16855562aa7230a6868493bac6028e33809c109421def6a152bb6d803855521da106e40527f4a0fcf6995c7533e193e337e09aea6e7f9e363d10
-
SSDEEP
6144:yH8IVk4Zehh58aShksd29V0mN1s0fVyQaUvPQP/s:yHhBSh59uksd2ku1sqQQ+8
Malware Config
Extracted
Family
systembc
C2
69.46.15.147:4001
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exedescription ioc process File created C:\Windows\Tasks\wow64.job 8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe File opened for modification C:\Windows\Tasks\wow64.job 8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 2024 wrote to memory of 268 2024 taskeng.exe 8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe PID 2024 wrote to memory of 268 2024 taskeng.exe 8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe PID 2024 wrote to memory of 268 2024 taskeng.exe 8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe PID 2024 wrote to memory of 268 2024 taskeng.exe 8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe"C:\Users\Admin\AppData\Local\Temp\8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe"1⤵
- Drops file in Windows directory
PID:1256
-
C:\Windows\system32\taskeng.exetaskeng.exe {705717EA-79B4-42F3-8E40-AF00C2C3C408} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exeC:\Users\Admin\AppData\Local\Temp\8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe start2⤵PID:268