Resubmissions
18-04-2024 05:27
240418-f5tv3acd72 1018-04-2024 05:27
240418-f5s9jadf9s 1018-04-2024 05:27
240418-f5p7wacd66 1018-04-2024 05:27
240418-f5plcacd64 1018-04-2024 05:27
240418-f5paksdf8z 10Analysis
-
max time kernel
299s -
max time network
300s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 05:27
Static task
static1
Behavioral task
behavioral1
Sample
88b7218e0e2ce38dcbb6647aebc1b915.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
88b7218e0e2ce38dcbb6647aebc1b915.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
88b7218e0e2ce38dcbb6647aebc1b915.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
88b7218e0e2ce38dcbb6647aebc1b915.exe
Resource
win10v2004-20240226-en
General
-
Target
88b7218e0e2ce38dcbb6647aebc1b915.exe
-
Size
168KB
-
MD5
88b7218e0e2ce38dcbb6647aebc1b915
-
SHA1
84359a09ba1025ef5e17521a098aa1a5b27300df
-
SHA256
c08ae3fc4f7db6848f829eb7548530e2522ee3eb60a57b2c38cd1bdc862f5d6f
-
SHA512
1976d16421d6085d9588c62712ea31b7bc31abb1f7bf8cae238b700fd5932d0f0aa46675e824201e5a292811c5bd6fe0e91d7b62d39b85e566a45d814255dd66
-
SSDEEP
3072:GlN7OGtM7vN+Ma/lkphLMzirj6gvzH2Hd81VrX2fMZ:k7OhfCGh4zw1vDE2nB
Malware Config
Extracted
systembc
knock0909.monster:4035
knock0909.xyz:4035
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1216 olga.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip4.seeip.org 8 ip4.seeip.org 5 api.ipify.org 6 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\olga.job 88b7218e0e2ce38dcbb6647aebc1b915.exe File created C:\Windows\Tasks\olga.job 88b7218e0e2ce38dcbb6647aebc1b915.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1720 88b7218e0e2ce38dcbb6647aebc1b915.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1216 2192 taskeng.exe 29 PID 2192 wrote to memory of 1216 2192 taskeng.exe 29 PID 2192 wrote to memory of 1216 2192 taskeng.exe 29 PID 2192 wrote to memory of 1216 2192 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\88b7218e0e2ce38dcbb6647aebc1b915.exe"C:\Users\Admin\AppData\Local\Temp\88b7218e0e2ce38dcbb6647aebc1b915.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
C:\Windows\system32\taskeng.exetaskeng.exe {11F3CF9F-9AEF-4CC5-AD28-C9CFDBBB60FA} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\ProgramData\muwpxas\olga.exeC:\ProgramData\muwpxas\olga.exe start2⤵
- Executes dropped EXE
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD588b7218e0e2ce38dcbb6647aebc1b915
SHA184359a09ba1025ef5e17521a098aa1a5b27300df
SHA256c08ae3fc4f7db6848f829eb7548530e2522ee3eb60a57b2c38cd1bdc862f5d6f
SHA5121976d16421d6085d9588c62712ea31b7bc31abb1f7bf8cae238b700fd5932d0f0aa46675e824201e5a292811c5bd6fe0e91d7b62d39b85e566a45d814255dd66