Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 05:12
Static task
static1
Behavioral task
behavioral1
Sample
66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe
Resource
win10v2004-20220812-en
General
-
Target
66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe
-
Size
223KB
-
MD5
49578a4ea87965f17a7ba98cefe683d1
-
SHA1
93737ea214d0b8b8053d81577c0c3570b434617f
-
SHA256
66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7
-
SHA512
2a78b77990df5e79aa66b5387b6f282010492082fd1832ded4a11dbf7a406938fd92f067d67135adab2d772c532f54170bad5c07901c6a2ed90932462c2f0f96
-
SSDEEP
6144:8WqvWaIeG6aViH5T8MtdF7GAghz5AU5VUDwWr7:wIgUE5gW7GlhNiwWr7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3720 Xcigea.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe File created C:\Windows\Xcigea.exe 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe File opened for modification C:\Windows\Xcigea.exe 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Xcigea.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Xcigea.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Xcigea.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\International Xcigea.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main Xcigea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe 3720 Xcigea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1780 wrote to memory of 3720 1780 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe 84 PID 1780 wrote to memory of 3720 1780 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe 84 PID 1780 wrote to memory of 3720 1780 66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe"C:\Users\Admin\AppData\Local\Temp\66f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\Xcigea.exeC:\Windows\Xcigea.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:3720
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426B
MD52f40461d361aff1618341c24ad26c09e
SHA1220da0f844cd05277815278f7457487b71a64e8a
SHA256c32e86cbbc5583583e7c0461ce9cefcd80be41f7ad307f6a04ff03b9422f00b2
SHA5123844fe599725b84b42137664c01d25c6fe57f084f9f0f204a5a8ef81bae10d6f3fd684289b3f7b573b5bc8fdb283d89b3c17846366a42ef6750207b03cf089c1
-
Filesize
223KB
MD549578a4ea87965f17a7ba98cefe683d1
SHA193737ea214d0b8b8053d81577c0c3570b434617f
SHA25666f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7
SHA5122a78b77990df5e79aa66b5387b6f282010492082fd1832ded4a11dbf7a406938fd92f067d67135adab2d772c532f54170bad5c07901c6a2ed90932462c2f0f96
-
Filesize
223KB
MD549578a4ea87965f17a7ba98cefe683d1
SHA193737ea214d0b8b8053d81577c0c3570b434617f
SHA25666f929612fc030ff1323aa9835b3d98e94069505978f6c231e5cb838d4086aa7
SHA5122a78b77990df5e79aa66b5387b6f282010492082fd1832ded4a11dbf7a406938fd92f067d67135adab2d772c532f54170bad5c07901c6a2ed90932462c2f0f96