Resubmissions
16-05-2022 16:24
220516-twn54sddfp 10Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2024 14:32
Static task
static1
Behavioral task
behavioral1
Sample
5d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
5d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a.exe
Resource
win10v2004-20240412-en
General
-
Target
5d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a.exe
-
Size
222KB
-
MD5
72cfa33b978294103889481feca472f2
-
SHA1
0615eb31fd67345b9fa0d57d12a3bcb363152abe
-
SHA256
5d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a
-
SHA512
d1de5fee23b7a858ec62b849cd8a41cf896ab8b6df4836c65ba36942c1d1727b36832d45713a578c93e8a0b8650bf55923568637d91bb9b2196257a2ae015559
-
SSDEEP
3072:m04yjyyUD1HncBNyBNp5oEug4OkyJAQF1G8Xrrw+cC+lJDJEQkjvuMM:SR1HUUPCEZ4OkyJ9rrw+cZTuZSMM
Malware Config
Extracted
systembc
fanstat18.club:4044
dexblog90.club:4044
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
gsrhbad.exegsrhbad.exepid process 4804 gsrhbad.exe 4364 gsrhbad.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 api.ipify.org 8 api.ipify.org -
Drops file in Windows directory 2 IoCs
Processes:
5d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a.exedescription ioc process File created C:\Windows\Tasks\gsrhbad.job 5d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a.exe File opened for modification C:\Windows\Tasks\gsrhbad.job 5d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
5d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a.exepid process 2020 5d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a.exe 2020 5d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a.exe"C:\Users\Admin\AppData\Local\Temp\5d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\lsrihx\gsrhbad.exeC:\ProgramData\lsrihx\gsrhbad.exe start21⤵
- Executes dropped EXE
-
C:\ProgramData\lsrihx\gsrhbad.exeC:\ProgramData\lsrihx\gsrhbad.exe start21⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\lsrihx\gsrhbad.exeFilesize
222KB
MD572cfa33b978294103889481feca472f2
SHA10615eb31fd67345b9fa0d57d12a3bcb363152abe
SHA2565d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a
SHA512d1de5fee23b7a858ec62b849cd8a41cf896ab8b6df4836c65ba36942c1d1727b36832d45713a578c93e8a0b8650bf55923568637d91bb9b2196257a2ae015559
-
memory/2020-1-0x0000000000740000-0x0000000000840000-memory.dmpFilesize
1024KB
-
memory/2020-2-0x0000000000530000-0x0000000000539000-memory.dmpFilesize
36KB
-
memory/2020-3-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/2020-14-0x0000000000740000-0x0000000000840000-memory.dmpFilesize
1024KB
-
memory/4364-31-0x0000000000700000-0x0000000000800000-memory.dmpFilesize
1024KB
-
memory/4364-32-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/4364-35-0x0000000000700000-0x0000000000800000-memory.dmpFilesize
1024KB
-
memory/4804-11-0x00000000006D0000-0x00000000007D0000-memory.dmpFilesize
1024KB
-
memory/4804-12-0x0000000000610000-0x0000000000619000-memory.dmpFilesize
36KB
-
memory/4804-13-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/4804-18-0x00000000006D0000-0x00000000007D0000-memory.dmpFilesize
1024KB