Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
abe36bf39d6167eb9c12fcdcf48ef508.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abe36bf39d6167eb9c12fcdcf48ef508.exe
Resource
win10v2004-20240226-en
General
-
Target
abe36bf39d6167eb9c12fcdcf48ef508.exe
-
Size
1.2MB
-
MD5
abe36bf39d6167eb9c12fcdcf48ef508
-
SHA1
496bd18fa6cd505a9e8f075e9a928ff0a2489c56
-
SHA256
837f62877205239f1fe4da919c60d141c30812018451ace07767895cbf6437d0
-
SHA512
45288821df6d8fd15195ddba6733262fa0c2918939ba55aa9b3a382883dcd0da7c30692c6c2cfc58be0305c25f36778a4b93bb113247e8a67b8afd4d7d7992a4
-
SSDEEP
24576:OAHnh+eWsN3skA4RV1Hom2KXMmHax4mkIykTKgm6G+C7X85:5h+ZkldoPK8YaxN1TP+7S
Malware Config
Extracted
Protocol: ftp- Host:
files.000webhost.com - Port:
21 - Username:
fdhfdcgfgg
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4568 webcheck.exe 4152 webcheck.exe 4696 webcheck.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 23 iplogger.org 24 iplogger.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000700000002320f-6.dat autoit_exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WinMgmts:\ webcheck.exe File opened for modification C:\Windows\SysWOW64\WinMgmts:\ webcheck.exe File opened for modification C:\Windows\SysWOW64\WinMgmts:\ webcheck.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\WinMgmts:\ abe36bf39d6167eb9c12fcdcf48ef508.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe 4568 webcheck.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4428 abe36bf39d6167eb9c12fcdcf48ef508.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\abe36bf39d6167eb9c12fcdcf48ef508.exe"C:\Users\Admin\AppData\Local\Temp\abe36bf39d6167eb9c12fcdcf48ef508.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
PID:4428
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-i..tional-codepage-875_31bf3856ad364e35_6.1.7600.16385_none_2adebd12b4e159ed\webcheck.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-i..tional-codepage-875_31bf3856ad364e35_6.1.7600.16385_none_2adebd12b4e159ed\webcheck.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-i..tional-codepage-875_31bf3856ad364e35_6.1.7600.16385_none_2adebd12b4e159ed\webcheck.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-i..tional-codepage-875_31bf3856ad364e35_6.1.7600.16385_none_2adebd12b4e159ed\webcheck.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4152
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-i..tional-codepage-875_31bf3856ad364e35_6.1.7600.16385_none_2adebd12b4e159ed\webcheck.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-i..tional-codepage-875_31bf3856ad364e35_6.1.7600.16385_none_2adebd12b4e159ed\webcheck.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-i..tional-codepage-875_31bf3856ad364e35_6.1.7600.16385_none_2adebd12b4e159ed\webcheck.exe
Filesize1.2MB
MD5abe36bf39d6167eb9c12fcdcf48ef508
SHA1496bd18fa6cd505a9e8f075e9a928ff0a2489c56
SHA256837f62877205239f1fe4da919c60d141c30812018451ace07767895cbf6437d0
SHA51245288821df6d8fd15195ddba6733262fa0c2918939ba55aa9b3a382883dcd0da7c30692c6c2cfc58be0305c25f36778a4b93bb113247e8a67b8afd4d7d7992a4