Overview
overview
10Static
static
10server.exe
windows7-x64
8server.exe
windows10-2004-x64
8server.out
ubuntu-18.04-amd64
7socks32_tor.dll
windows7-x64
8socks32_tor.dll
windows10-2004-x64
8socks_tor.exe
windows7-x64
10socks_tor.exe
windows10-2004-x64
10www/system...ip2.js
windows7-x64
1www/system...ip2.js
windows10-2004-x64
1www/system...x.html
windows7-x64
1www/system...x.html
windows10-2004-x64
1www/system...ord.js
windows7-x64
1www/system...ord.js
windows10-2004-x64
1Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-05-2023 04:53
Behavioral task
behavioral1
Sample
server.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
server.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
server.out
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral4
Sample
socks32_tor.dll
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
socks32_tor.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
socks_tor.exe
Resource
win7-20230220-en
Behavioral task
behavioral7
Sample
socks_tor.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
www/systembc/geoip/geoip2.js
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
www/systembc/geoip/geoip2.js
Resource
win10v2004-20230221-en
Behavioral task
behavioral10
Sample
www/systembc/index.html
Resource
win7-20230220-en
Behavioral task
behavioral11
Sample
www/systembc/index.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
www/systembc/password.js
Resource
win7-20230220-en
Behavioral task
behavioral13
Sample
www/systembc/password.js
Resource
win10v2004-20230220-en
General
-
Target
socks_tor.exe
-
Size
32KB
-
MD5
af6bc46db7a4d4ab3f4689848de18ddc
-
SHA1
5e00ccab03314b6c37a0a16f646fb13b8d1072ab
-
SHA256
c671384b86b7a99d4328402936f51ca9143543f8e6f715c8315e18d2e3c660e6
-
SHA512
81260938cc4b68cd61ed496ba99a873b2abdce7a57f27f9cbdab2acd1e70cade3acb394f0a2da01e4a3935deccf1b4006f550c38c2dbc1c4f2c19ad22a04250c
-
SSDEEP
768:HqPzUdiJ8dayafVcCSWYVYnPrryFbnpoJo2TZKc6wFg:YLJ8dayaaupDobnpo2wZu
Malware Config
Extracted
systembc
89.248.163.188:443
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
qubhfv.exepid process 1072 qubhfv.exe -
Drops file in Windows directory 2 IoCs
Processes:
socks_tor.exedescription ioc process File created C:\Windows\Tasks\qubhfv.job socks_tor.exe File opened for modification C:\Windows\Tasks\qubhfv.job socks_tor.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
socks_tor.exepid process 1332 socks_tor.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 876 wrote to memory of 1072 876 taskeng.exe qubhfv.exe PID 876 wrote to memory of 1072 876 taskeng.exe qubhfv.exe PID 876 wrote to memory of 1072 876 taskeng.exe qubhfv.exe PID 876 wrote to memory of 1072 876 taskeng.exe qubhfv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\socks_tor.exe"C:\Users\Admin\AppData\Local\Temp\socks_tor.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
C:\Windows\system32\taskeng.exetaskeng.exe {0EB00309-617C-44A3-A3A7-DE92157A424E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\ProgramData\xkosgj\qubhfv.exeC:\ProgramData\xkosgj\qubhfv.exe start2⤵
- Executes dropped EXE
PID:1072
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5af6bc46db7a4d4ab3f4689848de18ddc
SHA15e00ccab03314b6c37a0a16f646fb13b8d1072ab
SHA256c671384b86b7a99d4328402936f51ca9143543f8e6f715c8315e18d2e3c660e6
SHA51281260938cc4b68cd61ed496ba99a873b2abdce7a57f27f9cbdab2acd1e70cade3acb394f0a2da01e4a3935deccf1b4006f550c38c2dbc1c4f2c19ad22a04250c
-
Filesize
32KB
MD5af6bc46db7a4d4ab3f4689848de18ddc
SHA15e00ccab03314b6c37a0a16f646fb13b8d1072ab
SHA256c671384b86b7a99d4328402936f51ca9143543f8e6f715c8315e18d2e3c660e6
SHA51281260938cc4b68cd61ed496ba99a873b2abdce7a57f27f9cbdab2acd1e70cade3acb394f0a2da01e4a3935deccf1b4006f550c38c2dbc1c4f2c19ad22a04250c