Resubmissions
07-05-2024 12:39
240507-pvlldaga51 1007-05-2024 12:38
240507-pvh59aaf49 1007-05-2024 12:38
240507-pvf1wsga5w 1007-05-2024 12:38
240507-pvfecsga5s 1007-05-2024 12:38
240507-pvd7asaf44 1025-04-2024 12:54
240425-p5ektaah3x 10Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 12:38
Behavioral task
behavioral1
Sample
0b0466996b77c223295a05899525df93489cfda27c7c95b78bec4c6a595629d5.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0b0466996b77c223295a05899525df93489cfda27c7c95b78bec4c6a595629d5.exe
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
0b0466996b77c223295a05899525df93489cfda27c7c95b78bec4c6a595629d5.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
0b0466996b77c223295a05899525df93489cfda27c7c95b78bec4c6a595629d5.exe
Resource
win10v2004-20240419-en
General
-
Target
0b0466996b77c223295a05899525df93489cfda27c7c95b78bec4c6a595629d5.exe
-
Size
30KB
-
MD5
87968a631411cdf26058e8ae5a0902a5
-
SHA1
a09dc0e8855780430d10811834da6504eb1d72ad
-
SHA256
0b0466996b77c223295a05899525df93489cfda27c7c95b78bec4c6a595629d5
-
SHA512
07ce6246217a61085ae0ab7a6fade6429d7d946c4970ce79c1a7e22e1fc5f15949a09a0b04ec5bdc00cfd7bb5b11b6cfc5d8fbc9a3f39875443a1bbe7301644e
-
SSDEEP
768:4TwkPr8C6fuFdaAna6DCPt34GuYY92rjnPoJlvcaII1:MV8C6fuFdaz6+O1n2rjnPo7
Malware Config
Extracted
systembc
pzlkxadvert475.xyz:4044
pzfdmserv275.xyz:4044
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2568 qjfecwt.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 88.198.207.48 -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 ip4.seeip.org 7 ip4.seeip.org 4 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\qjfecwt.job 0b0466996b77c223295a05899525df93489cfda27c7c95b78bec4c6a595629d5.exe File opened for modification C:\Windows\Tasks\qjfecwt.job 0b0466996b77c223295a05899525df93489cfda27c7c95b78bec4c6a595629d5.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3056 0b0466996b77c223295a05899525df93489cfda27c7c95b78bec4c6a595629d5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2568 2984 taskeng.exe 29 PID 2984 wrote to memory of 2568 2984 taskeng.exe 29 PID 2984 wrote to memory of 2568 2984 taskeng.exe 29 PID 2984 wrote to memory of 2568 2984 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b0466996b77c223295a05899525df93489cfda27c7c95b78bec4c6a595629d5.exe"C:\Users\Admin\AppData\Local\Temp\0b0466996b77c223295a05899525df93489cfda27c7c95b78bec4c6a595629d5.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
C:\Windows\system32\taskeng.exetaskeng.exe {4D25095C-6A1B-47F8-ADE5-ECF0D358BDF3} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\ProgramData\kqkewk\qjfecwt.exeC:\ProgramData\kqkewk\qjfecwt.exe start2⤵
- Executes dropped EXE
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD587968a631411cdf26058e8ae5a0902a5
SHA1a09dc0e8855780430d10811834da6504eb1d72ad
SHA2560b0466996b77c223295a05899525df93489cfda27c7c95b78bec4c6a595629d5
SHA51207ce6246217a61085ae0ab7a6fade6429d7d946c4970ce79c1a7e22e1fc5f15949a09a0b04ec5bdc00cfd7bb5b11b6cfc5d8fbc9a3f39875443a1bbe7301644e