Analysis
-
max time kernel
151s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 05:12
Static task
static1
Behavioral task
behavioral1
Sample
66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe
Resource
win10v2004-20220812-en
General
-
Target
66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe
-
Size
223KB
-
MD5
49578a4ea87965f17a7ba98cefe683d1
-
SHA1
93737ea214d0b8b8053d81577c0c3570b434617f
-
SHA256
66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7
-
SHA512
2a78b77990df5e79aa66b5387b6f282010492082fd1832ded4a11dbf7a406938fd92f067d67135adab2d772c532f54170bad5c07901c6a2ed90932462c2f0f96
-
SSDEEP
6144:8WqvWaIeG6aViH5T8MtdF7GAghz5AU5VUDwWr7:wIgUE5gW7GlhNiwWr7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1956 Cnimaa.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe File created C:\Windows\Cnimaa.exe 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe File opened for modification C:\Windows\Cnimaa.exe 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Cnimaa.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Cnimaa.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Cnimaa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main Cnimaa.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\International Cnimaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe 1956 Cnimaa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 364 wrote to memory of 1956 364 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe 26 PID 364 wrote to memory of 1956 364 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe 26 PID 364 wrote to memory of 1956 364 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe 26 PID 364 wrote to memory of 1956 364 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe"C:\Users\Admin\AppData\Local\Temp\66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\Cnimaa.exeC:\Windows\Cnimaa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD549578a4ea87965f17a7ba98cefe683d1
SHA193737ea214d0b8b8053d81577c0c3570b434617f
SHA25666f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7
SHA5122a78b77990df5e79aa66b5387b6f282010492082fd1832ded4a11dbf7a406938fd92f067d67135adab2d772c532f54170bad5c07901c6a2ed90932462c2f0f96
-
Filesize
408B
MD58bafa04675c1753c4f324c4c9545acb2
SHA1f27d053a51c77573f5cbc0346a6f7677219c7930
SHA256bd10a7e8fc681084237b1545ba6f9dcac3320d7feabe0c992c82e9d27fee4e25
SHA5125ab782d8ca0bf101a47a6e75b73d59abaf02815497183549d39d3c8e6dc079894be2f7a0293587cb973f57a61f995727dbe621a5f5b98e3f071765bd140369e9