Resubmissions
13/04/2024, 09:24
240413-ldke7sfe9s 1013/04/2024, 09:21
240413-lbhhtsfe8v 1013/04/2024, 09:21
240413-lbef6sfe8t 1013/04/2024, 09:21
240413-lbd6eafe8s 1013/04/2024, 09:21
240413-lbdvmsfe71 1009/04/2024, 08:13
240409-j4mxxaad33 1009/04/2024, 08:13
240409-j4ml5sad32 1009/04/2024, 08:13
240409-j4l1lsad29 1009/04/2024, 08:13
240409-j4lpvaad28 10Analysis
-
max time kernel
1798s -
max time network
1801s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 08:13
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
sample.exe
Resource
win10v2004-20240226-en
General
-
Target
sample.exe
-
Size
171KB
-
MD5
8e3a80163ebba090c69ecdeec8860c8b
-
SHA1
3beb3fdd46f78d54c19f5d66f46172d6f5cde830
-
SHA256
c68035aabbe9b80ace209290aa28b8108cbb03a9d6a6301eb9a8d638db024ad0
-
SHA512
fe327e9f59d87f333ec0b2fcae916f41af8e5df5edaa2a2085e7998f3903746ad7de8b891f553b81d44ee49098de3105fae24e380c540b50c78a96ffc859da03
-
SSDEEP
3072:PGq7Cm2r13QuGGz7qr+qf8v0knEyc9TXA2J:Pj7jmGqqrlfGDcfJ
Malware Config
Extracted
systembc
admex175x.xyz:4044
servx278x.xyz:4044
Signatures
-
Contacts a large (643) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 2660 ewsdc.exe -
resource yara_rule behavioral1/files/0x000d000000012258-7.dat upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 88.198.207.48 -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip4.seeip.org 6 api.ipify.org 7 api.ipify.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\ewsdc.job sample.exe File opened for modification C:\Windows\Tasks\ewsdc.job sample.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1684 sample.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2660 2580 taskeng.exe 29 PID 2580 wrote to memory of 2660 2580 taskeng.exe 29 PID 2580 wrote to memory of 2660 2580 taskeng.exe 29 PID 2580 wrote to memory of 2660 2580 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
C:\Windows\system32\taskeng.exetaskeng.exe {2614E71B-9CA7-4D04-9493-43767005C69C} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\ProgramData\ccopoon\ewsdc.exeC:\ProgramData\ccopoon\ewsdc.exe start2⤵
- Executes dropped EXE
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD58e3a80163ebba090c69ecdeec8860c8b
SHA13beb3fdd46f78d54c19f5d66f46172d6f5cde830
SHA256c68035aabbe9b80ace209290aa28b8108cbb03a9d6a6301eb9a8d638db024ad0
SHA512fe327e9f59d87f333ec0b2fcae916f41af8e5df5edaa2a2085e7998f3903746ad7de8b891f553b81d44ee49098de3105fae24e380c540b50c78a96ffc859da03