Resubmissions
17/04/2024, 09:26
240417-lee7waah53 1017/04/2024, 09:26
240417-leddaaah47 1017/04/2024, 09:26
240417-lec3hsce2w 1017/04/2024, 09:26
240417-lecfzsce2v 1017/04/2024, 09:26
240417-lebvfsah45 1016/04/2024, 13:38
240416-qxqhsada21 10Analysis
-
max time kernel
294s -
max time network
301s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
7c05833514baa8de4f997a7fcb04096316f2fb44d77fcc0951bb50adbf8d58f5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c05833514baa8de4f997a7fcb04096316f2fb44d77fcc0951bb50adbf8d58f5.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
7c05833514baa8de4f997a7fcb04096316f2fb44d77fcc0951bb50adbf8d58f5.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
7c05833514baa8de4f997a7fcb04096316f2fb44d77fcc0951bb50adbf8d58f5.exe
Resource
win10v2004-20240226-en
General
-
Target
7c05833514baa8de4f997a7fcb04096316f2fb44d77fcc0951bb50adbf8d58f5.exe
-
Size
1.0MB
-
MD5
0a286d2f6060a92d15ddfd03063a1486
-
SHA1
172ae7b2059b420c463daf8ca58a55d8ab500d5c
-
SHA256
7c05833514baa8de4f997a7fcb04096316f2fb44d77fcc0951bb50adbf8d58f5
-
SHA512
bdcccaf8f7636bb54d74d1a1ead3288234a787c3b6d9c3d96e3584fc520088c97c98130e8fe030a1ee9551376b270f0ee5c6e53dd44581850e73abc9493d4cc7
-
SSDEEP
6144:X9mI/A/bpCQqR5yqL5pbqD8T/ruThC711qC711Q:X9ro/4QqLrqDC/ru8PDPQ
Malware Config
Extracted
systembc
yan0212.com:4039
yan0212.net:4039
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2392 nlju.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 88.198.207.48 -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip4.seeip.org 8 ip4.seeip.org 5 api.ipify.org 6 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\nlju.job 7c05833514baa8de4f997a7fcb04096316f2fb44d77fcc0951bb50adbf8d58f5.exe File created C:\Windows\Tasks\nlju.job 7c05833514baa8de4f997a7fcb04096316f2fb44d77fcc0951bb50adbf8d58f5.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2348 7c05833514baa8de4f997a7fcb04096316f2fb44d77fcc0951bb50adbf8d58f5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2392 2520 taskeng.exe 29 PID 2520 wrote to memory of 2392 2520 taskeng.exe 29 PID 2520 wrote to memory of 2392 2520 taskeng.exe 29 PID 2520 wrote to memory of 2392 2520 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c05833514baa8de4f997a7fcb04096316f2fb44d77fcc0951bb50adbf8d58f5.exe"C:\Users\Admin\AppData\Local\Temp\7c05833514baa8de4f997a7fcb04096316f2fb44d77fcc0951bb50adbf8d58f5.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
C:\Windows\system32\taskeng.exetaskeng.exe {1CB16B23-3DB8-4C5D-8576-2400E1FD8FEF} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\ProgramData\muxcf\nlju.exeC:\ProgramData\muxcf\nlju.exe start2⤵
- Executes dropped EXE
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD50a286d2f6060a92d15ddfd03063a1486
SHA1172ae7b2059b420c463daf8ca58a55d8ab500d5c
SHA2567c05833514baa8de4f997a7fcb04096316f2fb44d77fcc0951bb50adbf8d58f5
SHA512bdcccaf8f7636bb54d74d1a1ead3288234a787c3b6d9c3d96e3584fc520088c97c98130e8fe030a1ee9551376b270f0ee5c6e53dd44581850e73abc9493d4cc7