Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe
Resource
win7-20231129-en
General
-
Target
bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe
-
Size
662KB
-
MD5
0dd1f6c2b9bf477115701a1340d8d9a2
-
SHA1
7b074f54130217609435efe3f45ba38d363dd381
-
SHA256
bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711
-
SHA512
a3c8bcc7fe527eb2de6a6dd230bca9b4424653c6e251c1113bc27bd8c42cf79e1be1974e20c733e51be38f2c222ee1338257fd86209f2411f86e5f65213206e6
-
SSDEEP
12288:GubsNSOetfARQAPyGUu7zNubsNSOetfARQAPyGUfT+tkrvdv:GubsnafAPyjSzNubsnafAPyjZrvh
Malware Config
Extracted
systembc
cobusabobus.cam:4001
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
work.exepogflaw.exeixivgdm.exeixivgdm.exepid process 2236 work.exe 2660 pogflaw.exe 2496 ixivgdm.exe 1684 ixivgdm.exe -
Loads dropped DLL 5 IoCs
Processes:
cmd.exework.exepid process 668 cmd.exe 2236 work.exe 2236 work.exe 2236 work.exe 2236 work.exe -
Drops file in Windows directory 2 IoCs
Processes:
pogflaw.exedescription ioc process File created C:\Windows\Tasks\ixivgdm.job pogflaw.exe File opened for modification C:\Windows\Tasks\ixivgdm.job pogflaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
pogflaw.exepid process 2660 pogflaw.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.execmd.exework.exetaskeng.exedescription pid process target process PID 1704 wrote to memory of 668 1704 bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe cmd.exe PID 1704 wrote to memory of 668 1704 bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe cmd.exe PID 1704 wrote to memory of 668 1704 bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe cmd.exe PID 1704 wrote to memory of 668 1704 bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe cmd.exe PID 668 wrote to memory of 2236 668 cmd.exe work.exe PID 668 wrote to memory of 2236 668 cmd.exe work.exe PID 668 wrote to memory of 2236 668 cmd.exe work.exe PID 668 wrote to memory of 2236 668 cmd.exe work.exe PID 2236 wrote to memory of 2660 2236 work.exe pogflaw.exe PID 2236 wrote to memory of 2660 2236 work.exe pogflaw.exe PID 2236 wrote to memory of 2660 2236 work.exe pogflaw.exe PID 2236 wrote to memory of 2660 2236 work.exe pogflaw.exe PID 2476 wrote to memory of 2496 2476 taskeng.exe ixivgdm.exe PID 2476 wrote to memory of 2496 2476 taskeng.exe ixivgdm.exe PID 2476 wrote to memory of 2496 2476 taskeng.exe ixivgdm.exe PID 2476 wrote to memory of 2496 2476 taskeng.exe ixivgdm.exe PID 2476 wrote to memory of 1684 2476 taskeng.exe ixivgdm.exe PID 2476 wrote to memory of 1684 2476 taskeng.exe ixivgdm.exe PID 2476 wrote to memory of 1684 2476 taskeng.exe ixivgdm.exe PID 2476 wrote to memory of 1684 2476 taskeng.exe ixivgdm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe"C:\Users\Admin\AppData\Local\Temp\bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\pogflaw.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\pogflaw.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D0FA81A3-AE16-4473-BC03-63346C3F73B7} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\ProgramData\rhoud\ixivgdm.exeC:\ProgramData\rhoud\ixivgdm.exe start22⤵
- Executes dropped EXE
PID:2496
-
-
C:\ProgramData\rhoud\ixivgdm.exeC:\ProgramData\rhoud\ixivgdm.exe start22⤵
- Executes dropped EXE
PID:1684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
335KB
MD5577cc10d77b4ee44f8613fc7df186048
SHA11d188a807f9a7c55f62ccd4820fe8b89fb8d9e8b
SHA256e871608d80293f723b1f44f465054f8a6528c2b0354435b9360aeb849a29701c
SHA5126183b03eaeb88e8ea1ef2ccedb65cbd04fc05c028ce8e2f9e0aed6636717e1e7c9994a8fb9cf4ebf36e277618db7f612a2af4557749b1f6ef6c2b115837618fa
-
Filesize
16KB
MD54f01c3d7439dde153ff0110a26e2a71c
SHA140d7203ad4e1fd40e13a56e6f747ee480740873c
SHA256cfb1fd0adf528fcf14647cf3fcd85fb7e4fddd2167b36f9e8b2424b62453df28
SHA512513d09b80e1ac80813bc691e71cdf5348478157350e43b9daed27741b7f5a7a16b2ae4d88ee9951395747c7f2a93ff0c1f2c3753a9e3bad2e2607767a1e3d28e