Overview
overview
10Static
static
306063b690d...77.exe
windows10-2004-x64
1006063b690d...77.exe
windows7-x64
1006063b690d...77.exe
windows10-1703-x64
1006063b690d...77.exe
windows10-2004-x64
1006063b690d...77.exe
windows11-21h2-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3Resubmissions
18-04-2024 11:46
240418-nxbcraca34 1018-04-2024 11:45
240418-nw8a4adb71 1018-04-2024 11:45
240418-nw7pkadb7x 1018-04-2024 11:45
240418-nw2tbabh97 1018-04-2024 11:45
240418-nw17sabh96 1018-04-2024 10:00
240418-l12m1ahg84 10Analysis
-
max time kernel
1198s -
max time network
1204s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-04-2024 11:45
Static task
static1
Behavioral task
behavioral1
Sample
06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe
Resource
win7-20240220-en
Behavioral task
behavioral3
Sample
06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe
Resource
win11-20240412-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240412-en
General
-
Target
06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe
-
Size
192KB
-
MD5
610b4e85369410c52cd2c1f1c1b304ae
-
SHA1
1a1288380b4abddb9830ff22541583ba66f76f2c
-
SHA256
06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77
-
SHA512
46deda3922aff6aed04591aac09be1408798fc8e6d58ace5f9dca92ec33583b86ecf4b1fe52696f8128fd50cc27f14485cdc1bd51339788964d39f323d171c3a
-
SSDEEP
3072:rf1BDZ0kVB67Duw9AMc+bP1Yf0wK8F78CrLFOmvJfnah+vbkWS90tqNu/mOspgI:r9X0GgP1k0I84Loafnah+TJqNfppJ
Malware Config
Extracted
systembc
172.104.63.157:4001
Signatures
-
Executes dropped EXE 22 IoCs
pid Process 3756 asfj.exe 2448 asfj.exe 3536 asfj.exe 864 asfj.exe 3104 asfj.exe 3316 asfj.exe 360 asfj.exe 4756 asfj.exe 3996 asfj.exe 3844 asfj.exe 3792 asfj.exe 3720 asfj.exe 508 asfj.exe 3560 asfj.exe 4664 asfj.exe 2112 asfj.exe 3080 asfj.exe 1580 asfj.exe 600 asfj.exe 4888 asfj.exe 2936 asfj.exe 2972 asfj.exe -
Loads dropped DLL 12 IoCs
pid Process 3880 06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe 3756 asfj.exe 3536 asfj.exe 3104 asfj.exe 360 asfj.exe 3996 asfj.exe 3792 asfj.exe 508 asfj.exe 4664 asfj.exe 3080 asfj.exe 600 asfj.exe 2936 asfj.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 api.ipify.org 1 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\528123 asfj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\528123 asfj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\528123 asfj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\528123 asfj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\528123 asfj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\528123 asfj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\528123 asfj.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\528123 asfj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\528123 asfj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\528123 asfj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\528123 asfj.exe -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 3880 set thread context of 232 3880 06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe 81 PID 3756 set thread context of 2448 3756 asfj.exe 83 PID 3536 set thread context of 864 3536 asfj.exe 86 PID 3104 set thread context of 3316 3104 asfj.exe 88 PID 360 set thread context of 4756 360 asfj.exe 90 PID 3996 set thread context of 3844 3996 asfj.exe 92 PID 3792 set thread context of 3720 3792 asfj.exe 94 PID 508 set thread context of 3560 508 asfj.exe 96 PID 4664 set thread context of 2112 4664 asfj.exe 98 PID 3080 set thread context of 1580 3080 asfj.exe 100 PID 600 set thread context of 4888 600 asfj.exe 102 PID 2936 set thread context of 2972 2936 asfj.exe 104 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\asfj.job 06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe File opened for modification C:\Windows\Tasks\asfj.job 06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral5/files/0x000200000002aa46-14.dat nsis_installer_1 behavioral5/files/0x000200000002aa46-14.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 232 06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe 232 06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe -
Suspicious behavior: MapViewOfSection 12 IoCs
pid Process 3880 06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe 3756 asfj.exe 3536 asfj.exe 3104 asfj.exe 360 asfj.exe 3996 asfj.exe 3792 asfj.exe 508 asfj.exe 4664 asfj.exe 3080 asfj.exe 600 asfj.exe 2936 asfj.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3880 wrote to memory of 232 3880 06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe 81 PID 3880 wrote to memory of 232 3880 06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe 81 PID 3880 wrote to memory of 232 3880 06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe 81 PID 3880 wrote to memory of 232 3880 06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe 81 PID 3756 wrote to memory of 2448 3756 asfj.exe 83 PID 3756 wrote to memory of 2448 3756 asfj.exe 83 PID 3756 wrote to memory of 2448 3756 asfj.exe 83 PID 3756 wrote to memory of 2448 3756 asfj.exe 83 PID 3536 wrote to memory of 864 3536 asfj.exe 86 PID 3536 wrote to memory of 864 3536 asfj.exe 86 PID 3536 wrote to memory of 864 3536 asfj.exe 86 PID 3536 wrote to memory of 864 3536 asfj.exe 86 PID 3104 wrote to memory of 3316 3104 asfj.exe 88 PID 3104 wrote to memory of 3316 3104 asfj.exe 88 PID 3104 wrote to memory of 3316 3104 asfj.exe 88 PID 3104 wrote to memory of 3316 3104 asfj.exe 88 PID 360 wrote to memory of 4756 360 asfj.exe 90 PID 360 wrote to memory of 4756 360 asfj.exe 90 PID 360 wrote to memory of 4756 360 asfj.exe 90 PID 360 wrote to memory of 4756 360 asfj.exe 90 PID 3996 wrote to memory of 3844 3996 asfj.exe 92 PID 3996 wrote to memory of 3844 3996 asfj.exe 92 PID 3996 wrote to memory of 3844 3996 asfj.exe 92 PID 3996 wrote to memory of 3844 3996 asfj.exe 92 PID 3792 wrote to memory of 3720 3792 asfj.exe 94 PID 3792 wrote to memory of 3720 3792 asfj.exe 94 PID 3792 wrote to memory of 3720 3792 asfj.exe 94 PID 3792 wrote to memory of 3720 3792 asfj.exe 94 PID 508 wrote to memory of 3560 508 asfj.exe 96 PID 508 wrote to memory of 3560 508 asfj.exe 96 PID 508 wrote to memory of 3560 508 asfj.exe 96 PID 508 wrote to memory of 3560 508 asfj.exe 96 PID 4664 wrote to memory of 2112 4664 asfj.exe 98 PID 4664 wrote to memory of 2112 4664 asfj.exe 98 PID 4664 wrote to memory of 2112 4664 asfj.exe 98 PID 4664 wrote to memory of 2112 4664 asfj.exe 98 PID 3080 wrote to memory of 1580 3080 asfj.exe 100 PID 3080 wrote to memory of 1580 3080 asfj.exe 100 PID 3080 wrote to memory of 1580 3080 asfj.exe 100 PID 3080 wrote to memory of 1580 3080 asfj.exe 100 PID 600 wrote to memory of 4888 600 asfj.exe 102 PID 600 wrote to memory of 4888 600 asfj.exe 102 PID 600 wrote to memory of 4888 600 asfj.exe 102 PID 600 wrote to memory of 4888 600 asfj.exe 102 PID 2936 wrote to memory of 2972 2936 asfj.exe 104 PID 2936 wrote to memory of 2972 2936 asfj.exe 104 PID 2936 wrote to memory of 2972 2936 asfj.exe 104 PID 2936 wrote to memory of 2972 2936 asfj.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe"C:\Users\Admin\AppData\Local\Temp\06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe"C:\Users\Admin\AppData\Local\Temp\06063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start2⤵
- Executes dropped EXE
PID:2448
-
-
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start2⤵
- Executes dropped EXE
PID:864
-
-
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start2⤵
- Executes dropped EXE
PID:3316
-
-
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:360 -
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start2⤵
- Executes dropped EXE
PID:4756
-
-
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start2⤵
- Executes dropped EXE
PID:3844
-
-
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start2⤵
- Executes dropped EXE
PID:3720
-
-
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:508 -
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start2⤵
- Executes dropped EXE
PID:3560
-
-
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start2⤵
- Executes dropped EXE
PID:2112
-
-
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start2⤵
- Executes dropped EXE
PID:1580
-
-
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:600 -
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start2⤵
- Executes dropped EXE
PID:4888
-
-
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\ProgramData\rmoq\asfj.exeC:\ProgramData\rmoq\asfj.exe start2⤵
- Executes dropped EXE
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5610b4e85369410c52cd2c1f1c1b304ae
SHA11a1288380b4abddb9830ff22541583ba66f76f2c
SHA25606063b690db71cc96cc36b528e7a8fa599046491f976e94615392975b96b0d77
SHA51246deda3922aff6aed04591aac09be1408798fc8e6d58ace5f9dca92ec33583b86ecf4b1fe52696f8128fd50cc27f14485cdc1bd51339788964d39f323d171c3a
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c
-
Filesize
79KB
MD5ee40d796e288ef140dae1d135290d39f
SHA158b5efe9d6778d3b91b6fc238a03ef4df7053115
SHA256ad73fe27a27f6a9312bba56950898ef4bd23ba512b368a58b652e97f8346eb2b
SHA512f3a017bfb30c9112dee146e7396ecb918eb6f8159885b5d78d2e52c38dca1d83f9ab385fd24930ed78b721b2ae11f783b77ce05659cda508c03d59ea6b9a8e5c
-
Filesize
150KB
MD5b76e1d1a677d5ab98d816c5fd5874e9e
SHA1f7482d1b6b5e446f5d11848d40872f790ef671e3
SHA256cd2eb21478199118d1f113b8a5c36b3d3a7e19a4a7d963f48b8df14eba6ea10c
SHA5121ab74e04671abe7d685b6e7100a0a12b78cae00c3bd24c68f0ceebaf8924ee28bb582d4ef74bcd08c1f5e3a309e0468a845a630e118baf0f324a41c663d2a4be