Resubmissions
07-05-2024 12:41
240507-pw76rsgb4w 1007-05-2024 12:41
240507-pw69gagb4v 1007-05-2024 12:41
240507-pw13fsag43 1007-05-2024 12:41
240507-pw13fsgb3y 1007-05-2024 12:41
240507-pwr5jsgb2x 1025-04-2024 13:13
240425-qf4zvaba6w 10Analysis
-
max time kernel
299s -
max time network
303s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-04-2024 13:13
Behavioral task
behavioral1
Sample
c04fb7e860702a4c70586b4b15fb2a12a6821bf0a7e4e95dd8759ca1985c7dd6.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
c04fb7e860702a4c70586b4b15fb2a12a6821bf0a7e4e95dd8759ca1985c7dd6.exe
Resource
win7-20240215-en
Behavioral task
behavioral3
Sample
c04fb7e860702a4c70586b4b15fb2a12a6821bf0a7e4e95dd8759ca1985c7dd6.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
c04fb7e860702a4c70586b4b15fb2a12a6821bf0a7e4e95dd8759ca1985c7dd6.exe
Resource
win10v2004-20240226-en
General
-
Target
c04fb7e860702a4c70586b4b15fb2a12a6821bf0a7e4e95dd8759ca1985c7dd6.exe
-
Size
30KB
-
MD5
8f1bc2c9a71086445255730d272a3408
-
SHA1
7ab7a0e541850c5729d495097e0d7901771dc8b9
-
SHA256
c04fb7e860702a4c70586b4b15fb2a12a6821bf0a7e4e95dd8759ca1985c7dd6
-
SHA512
3dbfe018e29f014da1f6df132add029ce888d45ed5e22579c060a0a7b32f335433825c2bc41b96ebaafa2830a38bc45caaf656f6d4da67aea7698fc96a1bd6f0
-
SSDEEP
768:4TwkPr8C6fuFdaAna6DCPt34GuYY92rjnPoJlzcamI1:MV8C6fuFdaz6+O1n2rjnPo7
Malware Config
Extracted
systembc
pzlkxadvert475.xyz:4044
pzfdmserv275.xyz:4044
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4988 tpjcnxc.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 api.ipify.org 2 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\tpjcnxc.job c04fb7e860702a4c70586b4b15fb2a12a6821bf0a7e4e95dd8759ca1985c7dd6.exe File created C:\Windows\Tasks\tpjcnxc.job c04fb7e860702a4c70586b4b15fb2a12a6821bf0a7e4e95dd8759ca1985c7dd6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2548 c04fb7e860702a4c70586b4b15fb2a12a6821bf0a7e4e95dd8759ca1985c7dd6.exe 2548 c04fb7e860702a4c70586b4b15fb2a12a6821bf0a7e4e95dd8759ca1985c7dd6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c04fb7e860702a4c70586b4b15fb2a12a6821bf0a7e4e95dd8759ca1985c7dd6.exe"C:\Users\Admin\AppData\Local\Temp\c04fb7e860702a4c70586b4b15fb2a12a6821bf0a7e4e95dd8759ca1985c7dd6.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
C:\ProgramData\kqktw\tpjcnxc.exeC:\ProgramData\kqktw\tpjcnxc.exe start1⤵
- Executes dropped EXE
PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD58f1bc2c9a71086445255730d272a3408
SHA17ab7a0e541850c5729d495097e0d7901771dc8b9
SHA256c04fb7e860702a4c70586b4b15fb2a12a6821bf0a7e4e95dd8759ca1985c7dd6
SHA5123dbfe018e29f014da1f6df132add029ce888d45ed5e22579c060a0a7b32f335433825c2bc41b96ebaafa2830a38bc45caaf656f6d4da67aea7698fc96a1bd6f0