Analysis
-
max time kernel
170s -
max time network
217s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:45
Static task
static1
Behavioral task
behavioral1
Sample
61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe
Resource
win10v2004-20221111-en
General
-
Target
61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe
-
Size
329KB
-
MD5
cb0b8c27a0a6ee62b87cc27294ac3b74
-
SHA1
171e180505476e4b309c4314f596f6903ee845c3
-
SHA256
61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa
-
SHA512
e0ee2c150c1d90155dc9d7d27ce53db56bff578966bec7fa626b66d1c502766dff695181a29097f6bfd092d460e0a9ae8f4e6ce4903b01829ed46087f0cc380f
-
SSDEEP
6144:BtEV7FUg+iyUXe2ZsD9eBVtQRlc12iVkIFzA9TLSDoC3FHvKHM4n4:BaVFQiym920jcc1f9U9XS335vHN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ocodo.exepid process 1496 ocodo.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 740 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exepid process 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ocodo.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\Currentversion\Run ocodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7B2FDFC8-3774-AD4D-C411-AE4FF0968D52} = "C:\\Users\\Admin\\AppData\\Roaming\\Uppa\\ocodo.exe" ocodo.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exedescription pid process target process PID 1416 set thread context of 740 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe cmd.exe -
Processes:
61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
ocodo.exepid process 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe 1496 ocodo.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exeocodo.exepid process 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe 1496 ocodo.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exeocodo.exedescription pid process target process PID 1416 wrote to memory of 1496 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe ocodo.exe PID 1416 wrote to memory of 1496 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe ocodo.exe PID 1416 wrote to memory of 1496 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe ocodo.exe PID 1416 wrote to memory of 1496 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe ocodo.exe PID 1496 wrote to memory of 1132 1496 ocodo.exe taskhost.exe PID 1496 wrote to memory of 1132 1496 ocodo.exe taskhost.exe PID 1496 wrote to memory of 1132 1496 ocodo.exe taskhost.exe PID 1496 wrote to memory of 1132 1496 ocodo.exe taskhost.exe PID 1496 wrote to memory of 1132 1496 ocodo.exe taskhost.exe PID 1496 wrote to memory of 1236 1496 ocodo.exe Dwm.exe PID 1496 wrote to memory of 1236 1496 ocodo.exe Dwm.exe PID 1496 wrote to memory of 1236 1496 ocodo.exe Dwm.exe PID 1496 wrote to memory of 1236 1496 ocodo.exe Dwm.exe PID 1496 wrote to memory of 1236 1496 ocodo.exe Dwm.exe PID 1496 wrote to memory of 1276 1496 ocodo.exe Explorer.EXE PID 1496 wrote to memory of 1276 1496 ocodo.exe Explorer.EXE PID 1496 wrote to memory of 1276 1496 ocodo.exe Explorer.EXE PID 1496 wrote to memory of 1276 1496 ocodo.exe Explorer.EXE PID 1496 wrote to memory of 1276 1496 ocodo.exe Explorer.EXE PID 1496 wrote to memory of 1416 1496 ocodo.exe 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe PID 1496 wrote to memory of 1416 1496 ocodo.exe 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe PID 1496 wrote to memory of 1416 1496 ocodo.exe 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe PID 1496 wrote to memory of 1416 1496 ocodo.exe 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe PID 1496 wrote to memory of 1416 1496 ocodo.exe 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe PID 1416 wrote to memory of 740 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe cmd.exe PID 1416 wrote to memory of 740 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe cmd.exe PID 1416 wrote to memory of 740 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe cmd.exe PID 1416 wrote to memory of 740 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe cmd.exe PID 1416 wrote to memory of 740 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe cmd.exe PID 1416 wrote to memory of 740 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe cmd.exe PID 1416 wrote to memory of 740 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe cmd.exe PID 1416 wrote to memory of 740 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe cmd.exe PID 1416 wrote to memory of 740 1416 61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe"C:\Users\Admin\AppData\Local\Temp\61553495507bc4dfa2dfc44ecb01351f98893085a209a1f834c9ae80a29745aa.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Roaming\Uppa\ocodo.exe"C:\Users\Admin\AppData\Roaming\Uppa\ocodo.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7dac7c0d.bat"3⤵
- Deletes itself
PID:740
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1236
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD57abdcddcf82a7adadd6b6c27ef730925
SHA12a3c47002e8612c4d91251ce1c6ed2946f015ee0
SHA256ba633773c383b74dd51b6e406c5aa048469e4dc43ef85790fd548443e6d8b11c
SHA5124e103ecc20180f85a246f48165105f9930e92583399bfb60f90f3642f86df1aeb3670657fd5e2006e9bac00fce61f7b043ad7dca0421b05e347d9c8d45c631ab
-
Filesize
329KB
MD5673d50a5334623353f9ecb221bacb264
SHA168d4673fd567d4a15bddfab08aa64cff22279bd7
SHA256cc84b9e281517a7b93bf309a0e0944225c033e1cf62420731c6241af4e7a3622
SHA51216d6a68e3fd8953392f68b50ee21dc4b284db2979050e329a13f4ce9569fc4917294f59a436d7aca760e04d9ad8471231ffcc35e33c78c1e62a250ca5b788b5a
-
Filesize
329KB
MD5673d50a5334623353f9ecb221bacb264
SHA168d4673fd567d4a15bddfab08aa64cff22279bd7
SHA256cc84b9e281517a7b93bf309a0e0944225c033e1cf62420731c6241af4e7a3622
SHA51216d6a68e3fd8953392f68b50ee21dc4b284db2979050e329a13f4ce9569fc4917294f59a436d7aca760e04d9ad8471231ffcc35e33c78c1e62a250ca5b788b5a
-
Filesize
329KB
MD5673d50a5334623353f9ecb221bacb264
SHA168d4673fd567d4a15bddfab08aa64cff22279bd7
SHA256cc84b9e281517a7b93bf309a0e0944225c033e1cf62420731c6241af4e7a3622
SHA51216d6a68e3fd8953392f68b50ee21dc4b284db2979050e329a13f4ce9569fc4917294f59a436d7aca760e04d9ad8471231ffcc35e33c78c1e62a250ca5b788b5a
-
Filesize
329KB
MD5673d50a5334623353f9ecb221bacb264
SHA168d4673fd567d4a15bddfab08aa64cff22279bd7
SHA256cc84b9e281517a7b93bf309a0e0944225c033e1cf62420731c6241af4e7a3622
SHA51216d6a68e3fd8953392f68b50ee21dc4b284db2979050e329a13f4ce9569fc4917294f59a436d7aca760e04d9ad8471231ffcc35e33c78c1e62a250ca5b788b5a