Resubmissions
18-04-2024 11:20
240418-nfk6macg3w 1018-04-2024 11:20
240418-nfh19scg3t 1018-04-2024 11:20
240418-nfheqsbd89 1018-04-2024 11:20
240418-nfghfacg2x 1018-04-2024 11:20
240418-nffwxacg2w 1018-04-2024 09:59
240418-l1f2asba9x 10Analysis
-
max time kernel
298s -
max time network
302s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe
Resource
win10v2004-20240412-en
General
-
Target
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe
-
Size
350KB
-
MD5
0dc61438b79668900bd081bac6109760
-
SHA1
2ee66fd972c2d28ad30775971ba95056951910f0
-
SHA256
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd
-
SHA512
467b352ce6188e6126050c229cd47b526e83ef3535449c3f02b70491e159523d7cc8ebb28caab4e8d98627a22a0af1faf13b134072309dfe56ad175d18177ca7
-
SSDEEP
6144:RoX0oZ+rm/OV6ZH7XYuB4xpuMadbr2X3f+gOkXdhFr:Ry0xrm/h7XYuWCMaV2XWgO8hFr
Malware Config
Extracted
systembc
knock0909.monster:4035
knock0909.xyz:4035
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2620 cxuk.exe 2684 cxuk.exe 2324 cxuk.exe 1472 cxuk.exe 396 cxuk.exe 1776 cxuk.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1048 set thread context of 2200 1048 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 28 PID 2620 set thread context of 2684 2620 cxuk.exe 31 PID 2324 set thread context of 1472 2324 cxuk.exe 35 PID 396 set thread context of 1776 396 cxuk.exe 37 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\cxuk.job 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe File opened for modification C:\Windows\Tasks\cxuk.job 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2200 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2200 1048 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 28 PID 1048 wrote to memory of 2200 1048 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 28 PID 1048 wrote to memory of 2200 1048 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 28 PID 1048 wrote to memory of 2200 1048 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 28 PID 1048 wrote to memory of 2200 1048 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 28 PID 1048 wrote to memory of 2200 1048 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 28 PID 1048 wrote to memory of 2200 1048 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 28 PID 1048 wrote to memory of 2200 1048 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 28 PID 1048 wrote to memory of 2200 1048 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 28 PID 1048 wrote to memory of 2200 1048 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 28 PID 2628 wrote to memory of 2620 2628 taskeng.exe 30 PID 2628 wrote to memory of 2620 2628 taskeng.exe 30 PID 2628 wrote to memory of 2620 2628 taskeng.exe 30 PID 2628 wrote to memory of 2620 2628 taskeng.exe 30 PID 2620 wrote to memory of 2684 2620 cxuk.exe 31 PID 2620 wrote to memory of 2684 2620 cxuk.exe 31 PID 2620 wrote to memory of 2684 2620 cxuk.exe 31 PID 2620 wrote to memory of 2684 2620 cxuk.exe 31 PID 2620 wrote to memory of 2684 2620 cxuk.exe 31 PID 2620 wrote to memory of 2684 2620 cxuk.exe 31 PID 2620 wrote to memory of 2684 2620 cxuk.exe 31 PID 2620 wrote to memory of 2684 2620 cxuk.exe 31 PID 2620 wrote to memory of 2684 2620 cxuk.exe 31 PID 2620 wrote to memory of 2684 2620 cxuk.exe 31 PID 2628 wrote to memory of 2324 2628 taskeng.exe 34 PID 2628 wrote to memory of 2324 2628 taskeng.exe 34 PID 2628 wrote to memory of 2324 2628 taskeng.exe 34 PID 2628 wrote to memory of 2324 2628 taskeng.exe 34 PID 2324 wrote to memory of 1472 2324 cxuk.exe 35 PID 2324 wrote to memory of 1472 2324 cxuk.exe 35 PID 2324 wrote to memory of 1472 2324 cxuk.exe 35 PID 2324 wrote to memory of 1472 2324 cxuk.exe 35 PID 2324 wrote to memory of 1472 2324 cxuk.exe 35 PID 2324 wrote to memory of 1472 2324 cxuk.exe 35 PID 2324 wrote to memory of 1472 2324 cxuk.exe 35 PID 2324 wrote to memory of 1472 2324 cxuk.exe 35 PID 2324 wrote to memory of 1472 2324 cxuk.exe 35 PID 2324 wrote to memory of 1472 2324 cxuk.exe 35 PID 2628 wrote to memory of 396 2628 taskeng.exe 36 PID 2628 wrote to memory of 396 2628 taskeng.exe 36 PID 2628 wrote to memory of 396 2628 taskeng.exe 36 PID 2628 wrote to memory of 396 2628 taskeng.exe 36 PID 396 wrote to memory of 1776 396 cxuk.exe 37 PID 396 wrote to memory of 1776 396 cxuk.exe 37 PID 396 wrote to memory of 1776 396 cxuk.exe 37 PID 396 wrote to memory of 1776 396 cxuk.exe 37 PID 396 wrote to memory of 1776 396 cxuk.exe 37 PID 396 wrote to memory of 1776 396 cxuk.exe 37 PID 396 wrote to memory of 1776 396 cxuk.exe 37 PID 396 wrote to memory of 1776 396 cxuk.exe 37 PID 396 wrote to memory of 1776 396 cxuk.exe 37 PID 396 wrote to memory of 1776 396 cxuk.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe"C:\Users\Admin\AppData\Local\Temp\318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe"C:\Users\Admin\AppData\Local\Temp\318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9C0A0746-DDC5-48FD-B833-704DFB99C239} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\ProgramData\xlbucd\cxuk.exeC:\ProgramData\xlbucd\cxuk.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\ProgramData\xlbucd\cxuk.exeC:\ProgramData\xlbucd\cxuk.exe start3⤵
- Executes dropped EXE
PID:2684
-
-
-
C:\ProgramData\xlbucd\cxuk.exeC:\ProgramData\xlbucd\cxuk.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\ProgramData\xlbucd\cxuk.exeC:\ProgramData\xlbucd\cxuk.exe start3⤵
- Executes dropped EXE
PID:1472
-
-
-
C:\ProgramData\xlbucd\cxuk.exeC:\ProgramData\xlbucd\cxuk.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:396 -
C:\ProgramData\xlbucd\cxuk.exeC:\ProgramData\xlbucd\cxuk.exe start3⤵
- Executes dropped EXE
PID:1776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
350KB
MD50dc61438b79668900bd081bac6109760
SHA12ee66fd972c2d28ad30775971ba95056951910f0
SHA256318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd
SHA512467b352ce6188e6126050c229cd47b526e83ef3535449c3f02b70491e159523d7cc8ebb28caab4e8d98627a22a0af1faf13b134072309dfe56ad175d18177ca7