Analysis
-
max time kernel
294s -
max time network
298s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20-07-2023 03:38
Static task
static1
Behavioral task
behavioral1
Sample
8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe
Resource
win10-20230703-en
General
-
Target
8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe
-
Size
4.8MB
-
MD5
0b4e2d65448cb900ec1d64ea564de052
-
SHA1
d1348e11bf46327def51ff5c892894f9cb66e501
-
SHA256
8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92
-
SHA512
ead754d3337b40f7fd2d5820e888112d37824523b2000f847ef805ae9fc1a519c11fbd7f8c5a108b6275479d78ac21ae7a517a79456e0f9ce9b22713deda5d46
-
SSDEEP
12288:TeC3CZ/dn53l3lYZDGR2vK/BY3nLkpVpnG6kzD:i+m33l3lYZE2C/zG5
Malware Config
Extracted
systembc
91.103.252.89:4317
91.103.252.57:4317
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
omluf.exepid process 2292 omluf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run 8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe'\"" 8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe -
Drops file in Windows directory 1 IoCs
Processes:
8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exedescription ioc process File created C:\Windows\Tasks\bjjudjpwelrxhmsbhnu.job 8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 2708 wrote to memory of 2292 2708 taskeng.exe omluf.exe PID 2708 wrote to memory of 2292 2708 taskeng.exe omluf.exe PID 2708 wrote to memory of 2292 2708 taskeng.exe omluf.exe PID 2708 wrote to memory of 2292 2708 taskeng.exe omluf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe"C:\Users\Admin\AppData\Local\Temp\8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
PID:2256
-
C:\Windows\system32\taskeng.exetaskeng.exe {1AD7E9CE-10BF-4A52-8820-FBC62373B7FB} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\omluf.exeC:\Users\Admin\AppData\Local\Temp\omluf.exe2⤵
- Executes dropped EXE
PID:2292
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD5e2ec8ec54563605f55250a2240333a0d
SHA120b25702b9a699cf0ed75d5c1e1c81da5ba641bf
SHA25648329b1fbc1d5c5ff5ecb32c7bc3cb74cc68c28a8b65703687d8cd729140f963
SHA5127a9ceb9c69d621b8341d04e8963119ac80f266d5f86b438404ae9ba1b20267524f15fcb79fea285b1505d9d5cb7bb291cba28942a4d7e98076830ce13ff48228
-
Filesize
4.8MB
MD5e2ec8ec54563605f55250a2240333a0d
SHA120b25702b9a699cf0ed75d5c1e1c81da5ba641bf
SHA25648329b1fbc1d5c5ff5ecb32c7bc3cb74cc68c28a8b65703687d8cd729140f963
SHA5127a9ceb9c69d621b8341d04e8963119ac80f266d5f86b438404ae9ba1b20267524f15fcb79fea285b1505d9d5cb7bb291cba28942a4d7e98076830ce13ff48228