Analysis
-
max time kernel
99s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe
Resource
win10v2004-20220901-en
General
-
Target
cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe
-
Size
531KB
-
MD5
a29b37fde6d90bb0a6e998ebd742a440
-
SHA1
9add2fc923ef88a985e875183d66841b204fd328
-
SHA256
cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d
-
SHA512
b1fb42281445353708f2fef27c739c633a99bac99989d17095eeead0c6700a009fe79ba76359ebc02c311bd029799dfa2d7d0b67bb1f4c56f845cea5decf230d
-
SSDEEP
6144:s4UHFnuDk67fe2tlw9ay6qOxLfPcvgKV1:6luDk67Q23zKz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4932 cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.com -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\kernel.dll cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe File created C:\Windows\kernel.dll cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe File created C:\Windows\svchost.exe cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2416 cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe 2416 cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 4932 2416 cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe 82 PID 2416 wrote to memory of 4932 2416 cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe 82 PID 2416 wrote to memory of 4932 2416 cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe 82 PID 2416 wrote to memory of 980 2416 cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe 50
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe"C:\Users\Admin\AppData\Local\Temp\cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.comC:\Users\Admin\AppData\Local\Temp\cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.com3⤵
- Executes dropped EXE
PID:4932
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.com
Filesize443KB
MD506e2a2bb74ba9155d103a74b18c85a5b
SHA10df9736a82d8d5be856b5f9c5062592ed9851627
SHA256900fea254e92c734d6b2c91282aac9c1c92b75a23da0f5ab59f9ed8fa39c835c
SHA512410d10755b4768ead46eae914cc53c6c4c96f17ca4b82dc3bed795c4cc2f31f15c1e6d668897ebc69ac69257eae8017b7347eefe7a8a1aab9fb75335abfb84d0
-
C:\Users\Admin\AppData\Local\Temp\cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.com
Filesize443KB
MD506e2a2bb74ba9155d103a74b18c85a5b
SHA10df9736a82d8d5be856b5f9c5062592ed9851627
SHA256900fea254e92c734d6b2c91282aac9c1c92b75a23da0f5ab59f9ed8fa39c835c
SHA512410d10755b4768ead46eae914cc53c6c4c96f17ca4b82dc3bed795c4cc2f31f15c1e6d668897ebc69ac69257eae8017b7347eefe7a8a1aab9fb75335abfb84d0