Analysis
-
max time kernel
99s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-06-2022 08:34
Static task
static1
Behavioral task
behavioral1
Sample
21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe
Resource
win10v2004-20220414-en
General
-
Target
21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe
-
Size
19KB
-
MD5
822b6ee40e6a43272bdc7f913a0ee1de
-
SHA1
51efb6fafd128bd536047f9cbf10be874c65882c
-
SHA256
21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17
-
SHA512
61629ca4db5511e6bd71186a39e20a4229b1dbc2d13cefa7aebc871c1b7f3714988b77d7a3015fe64e73135ac9f48911dd1ec93f6b6618facc2ed7c6a6ce104d
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
coiome.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" coiome.exe -
Executes dropped EXE 1 IoCs
Processes:
coiome.exepid process 1668 coiome.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
mshta.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run mshta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\safe360 = "C:\\Program Files\\Common Files\\sfbsbvy\\coiome.exe" mshta.exe -
Drops file in Program Files directory 5 IoCs
Processes:
21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.execoiome.exedescription ioc process File opened for modification C:\Program Files (x86)\Common Files\sfbsbvy 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe File created C:\Program Files (x86)\TOV.hta 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe File created C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe File opened for modification C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe File opened for modification C:\Program Files (x86)\Common Files\sfbsbvy coiome.exe -
Launches sc.exe 9 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1836 sc.exe 2696 sc.exe 4260 sc.exe 1268 sc.exe 1236 sc.exe 3764 sc.exe 3432 sc.exe 4464 sc.exe 1832 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 4308 taskkill.exe 4256 taskkill.exe 4392 taskkill.exe -
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.2345.com/?kkkbaidu" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\default_page_url = "http://www.2345.com/?kkkbaidu" mshta.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
mshta.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?kkkbaidu" mshta.exe -
Modifies registry class 3 IoCs
Processes:
21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.execoiome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HTTP\shell\open\command coiome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\iexplore.exe\" -nohome" coiome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
coiome.exepid process 1668 coiome.exe 1668 coiome.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exetaskkill.execoiome.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2868 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe Token: SeDebugPrivilege 4308 taskkill.exe Token: SeDebugPrivilege 1668 coiome.exe Token: SeDebugPrivilege 4256 taskkill.exe Token: SeDebugPrivilege 4392 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.execmd.execoiome.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2868 wrote to memory of 4956 2868 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe mshta.exe PID 2868 wrote to memory of 4956 2868 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe mshta.exe PID 2868 wrote to memory of 4956 2868 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe mshta.exe PID 2868 wrote to memory of 1996 2868 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe cmd.exe PID 2868 wrote to memory of 1996 2868 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe cmd.exe PID 2868 wrote to memory of 1996 2868 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe cmd.exe PID 1996 wrote to memory of 4308 1996 cmd.exe taskkill.exe PID 1996 wrote to memory of 4308 1996 cmd.exe taskkill.exe PID 1996 wrote to memory of 4308 1996 cmd.exe taskkill.exe PID 2868 wrote to memory of 1668 2868 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe coiome.exe PID 2868 wrote to memory of 1668 2868 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe coiome.exe PID 2868 wrote to memory of 1668 2868 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe coiome.exe PID 2868 wrote to memory of 4540 2868 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe cmd.exe PID 2868 wrote to memory of 4540 2868 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe cmd.exe PID 2868 wrote to memory of 4540 2868 21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe cmd.exe PID 1668 wrote to memory of 2336 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 2336 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 2336 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 2268 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 2268 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 2268 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 2964 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 2964 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 2964 1668 coiome.exe cmd.exe PID 2268 wrote to memory of 4256 2268 cmd.exe taskkill.exe PID 2268 wrote to memory of 4256 2268 cmd.exe taskkill.exe PID 2268 wrote to memory of 4256 2268 cmd.exe taskkill.exe PID 2336 wrote to memory of 4260 2336 cmd.exe sc.exe PID 2336 wrote to memory of 4260 2336 cmd.exe sc.exe PID 2336 wrote to memory of 4260 2336 cmd.exe sc.exe PID 2964 wrote to memory of 4392 2964 cmd.exe taskkill.exe PID 2964 wrote to memory of 4392 2964 cmd.exe taskkill.exe PID 2964 wrote to memory of 4392 2964 cmd.exe taskkill.exe PID 1668 wrote to memory of 3300 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 3300 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 3300 1668 coiome.exe cmd.exe PID 3300 wrote to memory of 4464 3300 cmd.exe sc.exe PID 3300 wrote to memory of 4464 3300 cmd.exe sc.exe PID 3300 wrote to memory of 4464 3300 cmd.exe sc.exe PID 1668 wrote to memory of 4340 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 4340 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 4340 1668 coiome.exe cmd.exe PID 4340 wrote to memory of 1832 4340 cmd.exe sc.exe PID 4340 wrote to memory of 1832 4340 cmd.exe sc.exe PID 4340 wrote to memory of 1832 4340 cmd.exe sc.exe PID 1668 wrote to memory of 3512 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 3512 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 3512 1668 coiome.exe cmd.exe PID 3512 wrote to memory of 1268 3512 cmd.exe sc.exe PID 3512 wrote to memory of 1268 3512 cmd.exe sc.exe PID 3512 wrote to memory of 1268 3512 cmd.exe sc.exe PID 1668 wrote to memory of 1352 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 1352 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 1352 1668 coiome.exe cmd.exe PID 1352 wrote to memory of 1236 1352 cmd.exe sc.exe PID 1352 wrote to memory of 1236 1352 cmd.exe sc.exe PID 1352 wrote to memory of 1236 1352 cmd.exe sc.exe PID 1668 wrote to memory of 3284 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 3284 1668 coiome.exe cmd.exe PID 1668 wrote to memory of 3284 1668 coiome.exe cmd.exe PID 3284 wrote to memory of 1836 3284 cmd.exe sc.exe PID 3284 wrote to memory of 1836 3284 cmd.exe sc.exe PID 3284 wrote to memory of 1836 3284 cmd.exe sc.exe PID 1668 wrote to memory of 2660 1668 coiome.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe"C:\Users\Admin\AppData\Local\Temp\21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Program Files (x86)\TOV.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:4956 -
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im coiome.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im coiome.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4308 -
C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe"C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd /c sc delete JavaServe3⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\sc.exesc delete JavaServe4⤵
- Launches sc.exe
PID:4260 -
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im iejore.exe /f3⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im iejore.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4256 -
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im conime.exe /f3⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im conime.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4392 -
C:\Windows\SysWOW64\cmd.execmd /c sc stop LYTC3⤵
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\sc.exesc stop LYTC4⤵
- Launches sc.exe
PID:4464 -
C:\Windows\SysWOW64\cmd.execmd /c sc stop Messenger3⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\sc.exesc stop Messenger4⤵
- Launches sc.exe
PID:1832 -
C:\Windows\SysWOW64\cmd.execmd /c sc delete Messenger3⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\sc.exesc delete Messenger4⤵
- Launches sc.exe
PID:1268 -
C:\Windows\SysWOW64\cmd.execmd /c sc delete LYTC3⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\sc.exesc delete LYTC4⤵
- Launches sc.exe
PID:1236 -
C:\Windows\SysWOW64\cmd.execmd /c sc stop IE_WinserverName3⤵
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\sc.exesc stop IE_WinserverName4⤵
- Launches sc.exe
PID:1836 -
C:\Windows\SysWOW64\cmd.execmd /c sc delete IE_WinserverName3⤵PID:2660
-
C:\Windows\SysWOW64\sc.exesc delete IE_WinserverName4⤵
- Launches sc.exe
PID:3764 -
C:\Windows\SysWOW64\cmd.execmd /c sc stop HidServ3⤵PID:3196
-
C:\Windows\SysWOW64\sc.exesc stop HidServ4⤵
- Launches sc.exe
PID:3432 -
C:\Windows\SysWOW64\cmd.execmd /c sc delete HidServ3⤵PID:2480
-
C:\Windows\SysWOW64\sc.exesc delete HidServ4⤵
- Launches sc.exe
PID:2696 -
C:\Windows\SysWOW64\cmd.execmd /c cacls "C:\Documents and Settings\All Users\Application Data\Storm\update" /e /p everyone:n3⤵PID:2808
-
C:\Windows\SysWOW64\cacls.execacls "C:\Documents and Settings\All Users\Application Data\Storm\update" /e /p everyone:n4⤵PID:2828
-
C:\Windows\SysWOW64\cmd.execmd /c cacls "C:\Program Files\Common Files\Microsoft Shared\MSInfo" /e /p everyone:n3⤵PID:1156
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\MSInfo" /e /p everyone:n4⤵PID:940
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\21734f9be2c9d275c73596de56a06c6d526e0be43730cd78b26c1e0b19eb4b17.exe"2⤵PID:4540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5224159190de44d20f69f322122a7b291
SHA1cade57467ef9f2b51b56507ca51b21f6429c8172
SHA2568c772e37735ee3c4a362326474f7c9a117817023776d7f1e885e7d77ed9eafff
SHA512b9bf96d1fc7659322902ecfbc5bc98c2bd4b82a7df9018216dd871fe3923b00c79b2446f7ed34469af9e575f617635b69878d4e5359e3095fd227c8784e010ad
-
Filesize
4.0MB
MD5224159190de44d20f69f322122a7b291
SHA1cade57467ef9f2b51b56507ca51b21f6429c8172
SHA2568c772e37735ee3c4a362326474f7c9a117817023776d7f1e885e7d77ed9eafff
SHA512b9bf96d1fc7659322902ecfbc5bc98c2bd4b82a7df9018216dd871fe3923b00c79b2446f7ed34469af9e575f617635b69878d4e5359e3095fd227c8784e010ad
-
Filesize
785B
MD574ccbce1e5800180a01fb299767e310c
SHA15eee44303a3800e0ac31a103538dccfe4ffa57b2
SHA2567c800551aa79c34f689c2d87e3b24c2bfaca0d2815538650abe445c3cb3a77ec
SHA512581385678a72de017f99b41d565d5acd8b2ffa322e20ae9489803b6043fe6696ccab38c43ae5583afda73cb3f33b4fa33813c543ffb4e34b17394d1ec6fae6c8