Analysis
-
max time kernel
88s -
max time network
81s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe
Resource
win10v2004-20220812-en
General
-
Target
3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe
-
Size
68KB
-
MD5
14884e9e7367632ecab21056d0c7eda7
-
SHA1
9a9049dde7f8e604b2f8db7eccb1e6144b519e78
-
SHA256
3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5
-
SHA512
4ad34d2f05f0227ab21066eb9dc99bfa620ccf70fa945c49c7f787ee377b5208d5a68cf3f3032ae13c42528d1ff290834a1d0b7978e323e4c0366c0c8b9a2f3c
-
SSDEEP
768:RrpeUKbGP2fSy1A+pGmLZ8veIouYFvDEKqOt5bKP9nbcuyD7Utn:RMqy1AGGmLZ8GI3YpqOt5bsnouy8tn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1828 coiome.exe -
Stops running service(s) 3 TTPs
-
Deletes itself 1 IoCs
pid Process 1780 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run mshta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\safe360 = "C:\\Program Files\\Common Files\\sebsbvx\\coiome.exe" mshta.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\sebsbvx 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe File created C:\Program Files (x86)\XSX.hta 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe File created C:\Program Files (x86)\Common Files\sebsbvx\coiome.exe 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe File opened for modification C:\Program Files (x86)\Common Files\sebsbvx\coiome.exe 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe File opened for modification C:\Program Files (x86)\Common Files\sebsbvx coiome.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1672 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 776 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.52cailing.com" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\default_page_url = "http://www.52cailing.com" mshta.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.52cailing.com" mshta.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe Token: SeDebugPrivilege 776 taskkill.exe Token: SeDebugPrivilege 1828 coiome.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1012 wrote to memory of 1708 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 28 PID 1012 wrote to memory of 1708 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 28 PID 1012 wrote to memory of 1708 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 28 PID 1012 wrote to memory of 1708 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 28 PID 1012 wrote to memory of 1784 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 30 PID 1012 wrote to memory of 1784 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 30 PID 1012 wrote to memory of 1784 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 30 PID 1012 wrote to memory of 1784 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 30 PID 1784 wrote to memory of 776 1784 cmd.exe 32 PID 1784 wrote to memory of 776 1784 cmd.exe 32 PID 1784 wrote to memory of 776 1784 cmd.exe 32 PID 1784 wrote to memory of 776 1784 cmd.exe 32 PID 1012 wrote to memory of 1828 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 34 PID 1012 wrote to memory of 1828 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 34 PID 1012 wrote to memory of 1828 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 34 PID 1012 wrote to memory of 1828 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 34 PID 1012 wrote to memory of 1780 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 35 PID 1012 wrote to memory of 1780 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 35 PID 1012 wrote to memory of 1780 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 35 PID 1012 wrote to memory of 1780 1012 3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe 35 PID 1828 wrote to memory of 1648 1828 coiome.exe 38 PID 1828 wrote to memory of 1648 1828 coiome.exe 38 PID 1828 wrote to memory of 1648 1828 coiome.exe 38 PID 1828 wrote to memory of 1648 1828 coiome.exe 38 PID 1648 wrote to memory of 1672 1648 cmd.exe 40 PID 1648 wrote to memory of 1672 1648 cmd.exe 40 PID 1648 wrote to memory of 1672 1648 cmd.exe 40 PID 1648 wrote to memory of 1672 1648 cmd.exe 40 PID 1828 wrote to memory of 916 1828 coiome.exe 41 PID 1828 wrote to memory of 916 1828 coiome.exe 41 PID 1828 wrote to memory of 916 1828 coiome.exe 41 PID 1828 wrote to memory of 916 1828 coiome.exe 41 PID 1828 wrote to memory of 2000 1828 coiome.exe 43 PID 1828 wrote to memory of 2000 1828 coiome.exe 43 PID 1828 wrote to memory of 2000 1828 coiome.exe 43 PID 1828 wrote to memory of 2000 1828 coiome.exe 43 PID 916 wrote to memory of 1608 916 cmd.exe 46 PID 916 wrote to memory of 1608 916 cmd.exe 46 PID 916 wrote to memory of 1608 916 cmd.exe 46 PID 916 wrote to memory of 1608 916 cmd.exe 46 PID 2000 wrote to memory of 1584 2000 cmd.exe 45 PID 2000 wrote to memory of 1584 2000 cmd.exe 45 PID 2000 wrote to memory of 1584 2000 cmd.exe 45 PID 2000 wrote to memory of 1584 2000 cmd.exe 45 PID 1828 wrote to memory of 2012 1828 coiome.exe 47 PID 1828 wrote to memory of 2012 1828 coiome.exe 47 PID 1828 wrote to memory of 2012 1828 coiome.exe 47 PID 1828 wrote to memory of 2012 1828 coiome.exe 47 PID 1828 wrote to memory of 1772 1828 coiome.exe 49 PID 1828 wrote to memory of 1772 1828 coiome.exe 49 PID 1828 wrote to memory of 1772 1828 coiome.exe 49 PID 1828 wrote to memory of 1772 1828 coiome.exe 49 PID 1828 wrote to memory of 1952 1828 coiome.exe 51 PID 1828 wrote to memory of 1952 1828 coiome.exe 51 PID 1828 wrote to memory of 1952 1828 coiome.exe 51 PID 1828 wrote to memory of 1952 1828 coiome.exe 51 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1584 attrib.exe 1608 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe"C:\Users\Admin\AppData\Local\Temp\3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Program Files (x86)\XSX.hta"2⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:1708
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im coiome.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im coiome.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
-
C:\Program Files (x86)\Common Files\sebsbvx\coiome.exe"C:\Program Files (x86)\Common Files\sebsbvx\coiome.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\cmd.execmd /c sc delete JavaServe3⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\sc.exesc delete JavaServe4⤵
- Launches sc.exe
PID:1672
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Cookies\*.*"3⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Cookies\*.*"4⤵
- Views/modifies file attributes
PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Local Settings\Temp\Cookies\*.*"4⤵
- Views/modifies file attributes
PID:1584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Cookies\*.*3⤵PID:2012
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temporary Internet Files\*.*"3⤵PID:1772
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵PID:1952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\3fc2ae50cdcac490a95d55ac2462423945d765fbddbdbface31c45584070fdb5.exe"2⤵
- Deletes itself
PID:1780
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.1MB
MD506cd831d45fe403ac4b184205435236f
SHA1c562429ac498c60c335bd51325f3d841a10676f4
SHA256642082957fd28a64b6e3465885194a1d9ca2801c8c64af4de59487547ccf0a34
SHA512ac9785e7386b4538e854c98c7a9b4aaec5f58fb53a4641be5e32bde06976706e4d32fb61e2af54212cbda4910ff3ed3a1951e5e637fd4b252dabd76f641f5de2
-
Filesize
780B
MD5123760c0b2b15cca0448e52b2b7f9f48
SHA1e0d1004b3878b6c420b1c01f4953089c92921b20
SHA2564244569e7c8cd1d29b0e6a467b73b397c75cdbf607de60e101da0963a363a615
SHA5129aeb90f1cbf901da10bf75cc64177c1ecbd23fdfc9884caee442409bf34ebd6605c3dc6269b68490b7151554cb580a5e64c33a4ecdf42a5b146741fef022b9d1
-
Filesize
12.1MB
MD506cd831d45fe403ac4b184205435236f
SHA1c562429ac498c60c335bd51325f3d841a10676f4
SHA256642082957fd28a64b6e3465885194a1d9ca2801c8c64af4de59487547ccf0a34
SHA512ac9785e7386b4538e854c98c7a9b4aaec5f58fb53a4641be5e32bde06976706e4d32fb61e2af54212cbda4910ff3ed3a1951e5e637fd4b252dabd76f641f5de2
-
Filesize
12.1MB
MD506cd831d45fe403ac4b184205435236f
SHA1c562429ac498c60c335bd51325f3d841a10676f4
SHA256642082957fd28a64b6e3465885194a1d9ca2801c8c64af4de59487547ccf0a34
SHA512ac9785e7386b4538e854c98c7a9b4aaec5f58fb53a4641be5e32bde06976706e4d32fb61e2af54212cbda4910ff3ed3a1951e5e637fd4b252dabd76f641f5de2