Analysis Overview
SHA256
1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36
Threat Level: Known bad
The file 6f21ef2acc3d9b4bb18800d61c61b2f4.exe was found to be: Known bad.
Malicious Activity Summary
SystemBC
Executes dropped EXE
Drops file in Windows directory
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2023-02-09 08:19
Signatures
Analysis: behavioral2
Detonation Overview
Submitted
2023-02-09 08:19
Reported
2023-02-09 10:32
Platform
win10v2004-20220812-en
Max time kernel
171s
Max time network
173s
Command Line
Signatures
SystemBC
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\gxlbeg\elpgwx.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\elpgwx.job | C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe | N/A |
| File opened for modification | C:\Windows\Tasks\elpgwx.job | C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe
"C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe"
C:\ProgramData\gxlbeg\elpgwx.exe
C:\ProgramData\gxlbeg\elpgwx.exe start2
Network
| Country | Destination | Domain | Proto |
| US | 93.184.221.240:80 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| US | 209.197.3.8:80 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| US | 20.189.173.14:443 | tcp | |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 93.184.221.240:80 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
Files
memory/3500-132-0x0000000000650000-0x0000000000666000-memory.dmp
memory/3500-133-0x0000000000400000-0x00000000004D4000-memory.dmp
C:\ProgramData\gxlbeg\elpgwx.exe
| MD5 | 6f21ef2acc3d9b4bb18800d61c61b2f4 |
| SHA1 | d176b38b567ce050c82ecb8b0e4e8cc44a7ea0e4 |
| SHA256 | 1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36 |
| SHA512 | 45051de1630858e982b0a5050700b8dde734fa5e04d95720abaa137433d6a8239a15187638d88c0697d73641136248a9cace5f001eba4f744899da619ea90033 |
C:\ProgramData\gxlbeg\elpgwx.exe
| MD5 | 6f21ef2acc3d9b4bb18800d61c61b2f4 |
| SHA1 | d176b38b567ce050c82ecb8b0e4e8cc44a7ea0e4 |
| SHA256 | 1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36 |
| SHA512 | 45051de1630858e982b0a5050700b8dde734fa5e04d95720abaa137433d6a8239a15187638d88c0697d73641136248a9cace5f001eba4f744899da619ea90033 |
memory/3728-136-0x0000000000660000-0x0000000000676000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2023-02-09 08:19
Reported
2023-02-09 10:30
Platform
win7-20220901-en
Max time kernel
148s
Max time network
156s
Command Line
Signatures
SystemBC
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\rlps\kweeu.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\Tasks\kweeu.job | C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe | N/A |
| File created | C:\Windows\Tasks\kweeu.job | C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2036 wrote to memory of 2020 | N/A | C:\Windows\system32\taskeng.exe | C:\ProgramData\rlps\kweeu.exe |
| PID 2036 wrote to memory of 2020 | N/A | C:\Windows\system32\taskeng.exe | C:\ProgramData\rlps\kweeu.exe |
| PID 2036 wrote to memory of 2020 | N/A | C:\Windows\system32\taskeng.exe | C:\ProgramData\rlps\kweeu.exe |
| PID 2036 wrote to memory of 2020 | N/A | C:\Windows\system32\taskeng.exe | C:\ProgramData\rlps\kweeu.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe
"C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe"
C:\Windows\system32\taskeng.exe
taskeng.exe {7F964D56-A78A-4D63-857C-EE23C042E6CC} S-1-5-18:NT AUTHORITY\System:Service:
C:\ProgramData\rlps\kweeu.exe
C:\ProgramData\rlps\kweeu.exe start2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | inredrs5er.xyz | udp |
| US | 8.8.8.8:53 | s5s4txirgtrtin.com | udp |
Files
memory/828-54-0x0000000075AC1000-0x0000000075AC3000-memory.dmp
memory/828-55-0x00000000001D0000-0x00000000001E6000-memory.dmp
memory/828-56-0x0000000000400000-0x00000000004D4000-memory.dmp
C:\ProgramData\rlps\kweeu.exe
| MD5 | 6f21ef2acc3d9b4bb18800d61c61b2f4 |
| SHA1 | d176b38b567ce050c82ecb8b0e4e8cc44a7ea0e4 |
| SHA256 | 1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36 |
| SHA512 | 45051de1630858e982b0a5050700b8dde734fa5e04d95720abaa137433d6a8239a15187638d88c0697d73641136248a9cace5f001eba4f744899da619ea90033 |
memory/2020-58-0x0000000000000000-mapping.dmp
C:\ProgramData\rlps\kweeu.exe
| MD5 | 6f21ef2acc3d9b4bb18800d61c61b2f4 |
| SHA1 | d176b38b567ce050c82ecb8b0e4e8cc44a7ea0e4 |
| SHA256 | 1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36 |
| SHA512 | 45051de1630858e982b0a5050700b8dde734fa5e04d95720abaa137433d6a8239a15187638d88c0697d73641136248a9cace5f001eba4f744899da619ea90033 |
memory/2020-61-0x0000000000240000-0x0000000000256000-memory.dmp