Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-07-2024 13:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe
-
Size
266KB
-
MD5
63b509f4565ff9a05402b2b18083b53a
-
SHA1
a0c3ba7679a36976bbbbad6c08758054ba49af8b
-
SHA256
8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2
-
SHA512
49463bd0b39e16855562aa7230a6868493bac6028e33809c109421def6a152bb6d803855521da106e40527f4a0fcf6995c7533e193e337e09aea6e7f9e363d10
-
SSDEEP
6144:yH8IVk4Zehh58aShksd29V0mN1s0fVyQaUvPQP/s:yHhBSh59uksd2ku1sqQQ+8
Malware Config
Extracted
Family
systembc
C2
69.46.15.147:4001
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\wow64.job 8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe File created C:\Windows\Tasks\wow64.job 8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2568 2856 taskeng.exe 29 PID 2856 wrote to memory of 2568 2856 taskeng.exe 29 PID 2856 wrote to memory of 2568 2856 taskeng.exe 29 PID 2856 wrote to memory of 2568 2856 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe"C:\Users\Admin\AppData\Local\Temp\8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe"1⤵
- Drops file in Windows directory
PID:2028
-
C:\Windows\system32\taskeng.exetaskeng.exe {BF254AED-2641-448E-9635-E8A2FAF8F8E9} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exeC:\Users\Admin\AppData\Local\Temp\8ff416db5447cbcb7da7a2c10b20e3ec47f315fa15184979ea86c4e7e039a4c2.exe start2⤵PID:2568
-