Resubmissions
18-04-2024 05:25
240418-f4hreadf5z 1018-04-2024 05:25
240418-f4fl2scd33 1018-04-2024 05:25
240418-f4fbaadf5v 1018-04-2024 05:25
240418-f4edzscd32 1018-04-2024 05:25
240418-f4dsfscd29 10Analysis
-
max time kernel
1200s -
max time network
1200s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 05:25
Static task
static1
Behavioral task
behavioral1
Sample
fdc98ea3381d04350e38b592c2c63090d6f0bd32388a21fcfc5b7bfcb9753d20.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
fdc98ea3381d04350e38b592c2c63090d6f0bd32388a21fcfc5b7bfcb9753d20.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
fdc98ea3381d04350e38b592c2c63090d6f0bd32388a21fcfc5b7bfcb9753d20.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
fdc98ea3381d04350e38b592c2c63090d6f0bd32388a21fcfc5b7bfcb9753d20.exe
Resource
win10v2004-20240412-en
General
-
Target
fdc98ea3381d04350e38b592c2c63090d6f0bd32388a21fcfc5b7bfcb9753d20.exe
-
Size
121KB
-
MD5
2140899e877c2bb95f71f77c31e205ce
-
SHA1
b7322db66f0c4b5a48c10ca3213b899131045d11
-
SHA256
fdc98ea3381d04350e38b592c2c63090d6f0bd32388a21fcfc5b7bfcb9753d20
-
SHA512
6856af4f8cb1fceede24360c7e081e6beea701a44b80e6276db719e5cba3b6cf5f7fae8df4ce56852ea34e73dfa4e091a8ac258d1efb596e0d7224b33402fe07
-
SSDEEP
1536:R7YvZGrzMeJILNJMuxyBye/DB79CTi+Ey7c3Ul4kfQuk2RGiXqp64:KvZ8NSLP60e/FeRhTfXrRGN64
Malware Config
Extracted
systembc
sdadvert197.com:4044
mexstat128.com:4044
Signatures
-
Contacts a large (664) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 2564 ltxds.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 87.236.195.203 -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org 7 api.ipify.org 8 ip4.seeip.org 9 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\ltxds.job fdc98ea3381d04350e38b592c2c63090d6f0bd32388a21fcfc5b7bfcb9753d20.exe File opened for modification C:\Windows\Tasks\ltxds.job fdc98ea3381d04350e38b592c2c63090d6f0bd32388a21fcfc5b7bfcb9753d20.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1264 fdc98ea3381d04350e38b592c2c63090d6f0bd32388a21fcfc5b7bfcb9753d20.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2564 2968 taskeng.exe 29 PID 2968 wrote to memory of 2564 2968 taskeng.exe 29 PID 2968 wrote to memory of 2564 2968 taskeng.exe 29 PID 2968 wrote to memory of 2564 2968 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdc98ea3381d04350e38b592c2c63090d6f0bd32388a21fcfc5b7bfcb9753d20.exe"C:\Users\Admin\AppData\Local\Temp\fdc98ea3381d04350e38b592c2c63090d6f0bd32388a21fcfc5b7bfcb9753d20.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1264
-
C:\Windows\system32\taskeng.exetaskeng.exe {6A2A9AEE-3049-46F8-AA1B-F7F186E04F54} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\ProgramData\vnixt\ltxds.exeC:\ProgramData\vnixt\ltxds.exe start2⤵
- Executes dropped EXE
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD52140899e877c2bb95f71f77c31e205ce
SHA1b7322db66f0c4b5a48c10ca3213b899131045d11
SHA256fdc98ea3381d04350e38b592c2c63090d6f0bd32388a21fcfc5b7bfcb9753d20
SHA5126856af4f8cb1fceede24360c7e081e6beea701a44b80e6276db719e5cba3b6cf5f7fae8df4ce56852ea34e73dfa4e091a8ac258d1efb596e0d7224b33402fe07