Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 10:41
Behavioral task
behavioral1
Sample
cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exe
Resource
win7-20240419-en
General
-
Target
cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exe
-
Size
16KB
-
MD5
c661a77c31f83c413a96b5537ad31989
-
SHA1
8a5a47e39a9efa9dc4de447d2ae4cd5e375e3557
-
SHA256
cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1
-
SHA512
b86e45d36d8566b51f932f660ee9c3d79cea1a2eb34a9f7da7b2ccc5e50c74f319e8005e43d719c5722ec148ddddf1351a7f9edc430888e572b3884d1610b1aa
-
SSDEEP
384:rC+AHNZw/WnlrobdglGbLMoy+yG+yir1dV:r0gklrydgQP1yO67V
Malware Config
Extracted
systembc
clwtumberaero.cyou:4001
185.43.220.45:4001
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
mbqhdn.exembqhdn.exepid process 2680 mbqhdn.exe 1776 mbqhdn.exe -
Drops file in Windows directory 2 IoCs
Processes:
cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exedescription ioc process File opened for modification C:\Windows\Tasks\mbqhdn.job cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exe File created C:\Windows\Tasks\mbqhdn.job cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exepid process 2084 cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
taskeng.exedescription pid process target process PID 3040 wrote to memory of 2680 3040 taskeng.exe mbqhdn.exe PID 3040 wrote to memory of 2680 3040 taskeng.exe mbqhdn.exe PID 3040 wrote to memory of 2680 3040 taskeng.exe mbqhdn.exe PID 3040 wrote to memory of 2680 3040 taskeng.exe mbqhdn.exe PID 3040 wrote to memory of 1776 3040 taskeng.exe mbqhdn.exe PID 3040 wrote to memory of 1776 3040 taskeng.exe mbqhdn.exe PID 3040 wrote to memory of 1776 3040 taskeng.exe mbqhdn.exe PID 3040 wrote to memory of 1776 3040 taskeng.exe mbqhdn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exe"C:\Users\Admin\AppData\Local\Temp\cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
C:\Windows\system32\taskeng.exetaskeng.exe {72257ED4-C7D8-4F24-856D-F97762F14D3F} S-1-5-21-481678230-3773327859-3495911762-1000:UIBNQNMA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\ProgramData\gntcjfq\mbqhdn.exeC:\ProgramData\gntcjfq\mbqhdn.exe start22⤵
- Executes dropped EXE
PID:2680
-
-
C:\ProgramData\gntcjfq\mbqhdn.exeC:\ProgramData\gntcjfq\mbqhdn.exe start22⤵
- Executes dropped EXE
PID:1776
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5c661a77c31f83c413a96b5537ad31989
SHA18a5a47e39a9efa9dc4de447d2ae4cd5e375e3557
SHA256cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1
SHA512b86e45d36d8566b51f932f660ee9c3d79cea1a2eb34a9f7da7b2ccc5e50c74f319e8005e43d719c5722ec148ddddf1351a7f9edc430888e572b3884d1610b1aa