Resubmissions
14-01-2025 09:53
250114-lwyesaxjan 1014-01-2025 06:39
250114-henx8szmaz 1020-06-2022 14:10
220620-rgn6fsdgdq 10Analysis
-
max time kernel
37s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-06-2022 14:10
Static task
static1
Behavioral task
behavioral1
Sample
ccc.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
ccc.exe
-
Size
202KB
-
MD5
a88b1378237da8dc5ce1b174b08ba618
-
SHA1
35063e0fadc39dcd690b3f20793223f096a614d9
-
SHA256
dcb5330316f2cd274e28927e3ebb604e55fe6604593c45a3c2a24799190bb363
-
SHA512
6130b66ea4a724408321c985559dcfee0dba4ccd69388cfe1588128d2dcccb56325834de47a8fd9edabca7ea6fcf9a8159758b72fc0beaef4cbe10b32ae4483c
Malware Config
Signatures
-
suricata: ET MALWARE Possible NanoCore C2 60B
suricata: ET MALWARE Possible NanoCore C2 60B
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Service = "C:\\Program Files (x86)\\TCP Service\\tcpsvc.exe" ccc.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ccc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\TCP Service\tcpsvc.exe ccc.exe File opened for modification C:\Program Files (x86)\TCP Service\tcpsvc.exe ccc.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "13" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3436 ccc.exe 3436 ccc.exe 3436 ccc.exe 3436 ccc.exe 3436 ccc.exe 3436 ccc.exe 3436 ccc.exe 3436 ccc.exe 3436 ccc.exe 3436 ccc.exe 3436 ccc.exe 3436 ccc.exe 3436 ccc.exe 3436 ccc.exe 3436 ccc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3436 ccc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3436 ccc.exe Token: SeShutdownPrivilege 3436 ccc.exe Token: SeDebugPrivilege 3436 ccc.exe Token: SeDebugPrivilege 3436 ccc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3088 LogonUI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccc.exe"C:\Users\Admin\AppData\Local\Temp\ccc.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3436
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39e3855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3088