Analysis
-
max time kernel
292s -
max time network
300s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20-07-2023 03:37
Static task
static1
Behavioral task
behavioral1
Sample
728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe
Resource
win10-20230703-en
General
-
Target
728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe
-
Size
4.8MB
-
MD5
a5fa62f8cb515e6aafc529b34671c6a7
-
SHA1
09ba2232776cdb5c41349fd50a8ddf5883fbfb85
-
SHA256
728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda
-
SHA512
0ecb161bab04660bbfcd75d01ea348a6abae3b12a5c1db42b0ee9a7a931cac1d6c931ea2db4a5dccdeb2dee39d9ba907b3e04df72b4dd79319ff818825140682
-
SSDEEP
12288:TeC3CZ/dn53l3lYZDGR2vK/BY3nLkpVpnG6kzv:i+m33l3lYZE2C/zG5
Malware Config
Extracted
systembc
91.103.252.89:4317
91.103.252.57:4317
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
rxct.exepid process 2504 rxct.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Run 728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe'\"" 728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe -
Drops file in Windows directory 1 IoCs
Processes:
728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exedescription ioc process File created C:\Windows\Tasks\ulliigbbvwsomlhjfea.job 728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 2820 wrote to memory of 2504 2820 taskeng.exe rxct.exe PID 2820 wrote to memory of 2504 2820 taskeng.exe rxct.exe PID 2820 wrote to memory of 2504 2820 taskeng.exe rxct.exe PID 2820 wrote to memory of 2504 2820 taskeng.exe rxct.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe"C:\Users\Admin\AppData\Local\Temp\728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
PID:3024
-
C:\Windows\system32\taskeng.exetaskeng.exe {3771FF98-128D-4FBF-9C49-C2A321ACD31E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\rxct.exeC:\Users\Admin\AppData\Local\Temp\rxct.exe2⤵
- Executes dropped EXE
PID:2504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD5e2ec8ec54563605f55250a2240333a0d
SHA120b25702b9a699cf0ed75d5c1e1c81da5ba641bf
SHA25648329b1fbc1d5c5ff5ecb32c7bc3cb74cc68c28a8b65703687d8cd729140f963
SHA5127a9ceb9c69d621b8341d04e8963119ac80f266d5f86b438404ae9ba1b20267524f15fcb79fea285b1505d9d5cb7bb291cba28942a4d7e98076830ce13ff48228
-
Filesize
4.8MB
MD5e2ec8ec54563605f55250a2240333a0d
SHA120b25702b9a699cf0ed75d5c1e1c81da5ba641bf
SHA25648329b1fbc1d5c5ff5ecb32c7bc3cb74cc68c28a8b65703687d8cd729140f963
SHA5127a9ceb9c69d621b8341d04e8963119ac80f266d5f86b438404ae9ba1b20267524f15fcb79fea285b1505d9d5cb7bb291cba28942a4d7e98076830ce13ff48228