Analysis Overview
SHA256
7d17668ad7a09802bbf39bd76093ddb9658d74cffaefc3528463b77573802728
Threat Level: Known bad
The file 5cacf2b43b8d5578156df066f2181117.exe was found to be: Known bad.
Malicious Activity Summary
SystemBC
UPX packed file
Executes dropped EXE
Drops file in Windows directory
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2023-02-09 08:20
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2023-02-09 08:20
Reported
2023-02-09 09:38
Platform
win10v2004-20221111-en
Max time kernel
260s
Max time network
298s
Command Line
Signatures
SystemBC
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\pgpfaej\lwkahq.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\lwkahq.job | C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe | N/A |
| File opened for modification | C:\Windows\Tasks\lwkahq.job | C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe
"C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe"
C:\ProgramData\pgpfaej\lwkahq.exe
C:\ProgramData\pgpfaej\lwkahq.exe start2
Network
| Country | Destination | Domain | Proto |
| US | 93.184.220.29:80 | tcp | |
| IE | 20.50.80.209:443 | tcp | |
| US | 93.184.220.29:80 | tcp | |
| NL | 104.80.225.205:443 | tcp | |
| US | 72.21.81.240:80 | tcp | |
| US | 72.21.81.240:80 | tcp | |
| US | 72.21.81.240:80 | tcp | |
| US | 8.247.210.254:80 | tcp |
Files
memory/632-132-0x0000000000400000-0x0000000000459000-memory.dmp
memory/632-133-0x0000000000400000-0x0000000000459000-memory.dmp
memory/632-134-0x0000000000400000-0x0000000000459000-memory.dmp
memory/632-135-0x0000000002270000-0x00000000022A4000-memory.dmp
C:\ProgramData\pgpfaej\lwkahq.exe
| MD5 | 5cacf2b43b8d5578156df066f2181117 |
| SHA1 | 7e4e1385713db3e859bdd5ad6b503e7013b37796 |
| SHA256 | 7d17668ad7a09802bbf39bd76093ddb9658d74cffaefc3528463b77573802728 |
| SHA512 | c7a1e2fafc31d2ce366f5130d28835afdb88f9298fede4121c812f2d5222ff8d855f31e11e54b5b44fbc1d376e16103f0a04794baac62618c72f00aaef6a8142 |
C:\ProgramData\pgpfaej\lwkahq.exe
| MD5 | 5cacf2b43b8d5578156df066f2181117 |
| SHA1 | 7e4e1385713db3e859bdd5ad6b503e7013b37796 |
| SHA256 | 7d17668ad7a09802bbf39bd76093ddb9658d74cffaefc3528463b77573802728 |
| SHA512 | c7a1e2fafc31d2ce366f5130d28835afdb88f9298fede4121c812f2d5222ff8d855f31e11e54b5b44fbc1d376e16103f0a04794baac62618c72f00aaef6a8142 |
memory/4632-138-0x0000000000400000-0x0000000000459000-memory.dmp
memory/4632-139-0x0000000000400000-0x0000000000459000-memory.dmp
memory/4632-140-0x0000000000400000-0x0000000000459000-memory.dmp
memory/4632-141-0x0000000002730000-0x0000000002764000-memory.dmp
memory/632-142-0x0000000000400000-0x0000000000459000-memory.dmp
memory/4632-143-0x0000000000400000-0x0000000000459000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2023-02-09 08:20
Reported
2023-02-09 09:18
Platform
win7-20221111-en
Max time kernel
171s
Max time network
149s
Command Line
Signatures
SystemBC
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\vkquc\vpibwo.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\vpibwo.job | C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe | N/A |
| File opened for modification | C:\Windows\Tasks\vpibwo.job | C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1480 wrote to memory of 1852 | N/A | C:\Windows\system32\taskeng.exe | C:\ProgramData\vkquc\vpibwo.exe |
| PID 1480 wrote to memory of 1852 | N/A | C:\Windows\system32\taskeng.exe | C:\ProgramData\vkquc\vpibwo.exe |
| PID 1480 wrote to memory of 1852 | N/A | C:\Windows\system32\taskeng.exe | C:\ProgramData\vkquc\vpibwo.exe |
| PID 1480 wrote to memory of 1852 | N/A | C:\Windows\system32\taskeng.exe | C:\ProgramData\vkquc\vpibwo.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe
"C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe"
C:\Windows\system32\taskeng.exe
taskeng.exe {59AE4BBD-F34A-42F7-8E88-976DAF5CAF41} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]
C:\ProgramData\vkquc\vpibwo.exe
C:\ProgramData\vkquc\vpibwo.exe start2
Network
| Country | Destination | Domain | Proto |
| US | 204.79.197.200:443 | tcp | |
| NL | 84.53.175.11:80 | tcp |
Files
memory/588-54-0x0000000075881000-0x0000000075883000-memory.dmp
memory/588-55-0x0000000000400000-0x0000000000459000-memory.dmp
memory/588-56-0x0000000000400000-0x0000000000459000-memory.dmp
memory/588-57-0x0000000000400000-0x0000000000459000-memory.dmp
memory/588-58-0x0000000000550000-0x0000000000584000-memory.dmp
C:\ProgramData\vkquc\vpibwo.exe
| MD5 | 5cacf2b43b8d5578156df066f2181117 |
| SHA1 | 7e4e1385713db3e859bdd5ad6b503e7013b37796 |
| SHA256 | 7d17668ad7a09802bbf39bd76093ddb9658d74cffaefc3528463b77573802728 |
| SHA512 | c7a1e2fafc31d2ce366f5130d28835afdb88f9298fede4121c812f2d5222ff8d855f31e11e54b5b44fbc1d376e16103f0a04794baac62618c72f00aaef6a8142 |
memory/1852-60-0x0000000000000000-mapping.dmp
C:\ProgramData\vkquc\vpibwo.exe
| MD5 | 5cacf2b43b8d5578156df066f2181117 |
| SHA1 | 7e4e1385713db3e859bdd5ad6b503e7013b37796 |
| SHA256 | 7d17668ad7a09802bbf39bd76093ddb9658d74cffaefc3528463b77573802728 |
| SHA512 | c7a1e2fafc31d2ce366f5130d28835afdb88f9298fede4121c812f2d5222ff8d855f31e11e54b5b44fbc1d376e16103f0a04794baac62618c72f00aaef6a8142 |
memory/1852-63-0x0000000000400000-0x0000000000459000-memory.dmp
memory/1852-64-0x0000000000400000-0x0000000000459000-memory.dmp
memory/1852-65-0x0000000001CE0000-0x0000000001D14000-memory.dmp
memory/1852-66-0x0000000000400000-0x0000000000459000-memory.dmp
memory/588-67-0x0000000000400000-0x0000000000459000-memory.dmp