Analysis
-
max time kernel
152s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:44
Static task
static1
Behavioral task
behavioral1
Sample
739003fabfa0179bc5d607489bbf79d20a984993a31721fcc9fafefff4010cac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
739003fabfa0179bc5d607489bbf79d20a984993a31721fcc9fafefff4010cac.exe
Resource
win10v2004-20221111-en
General
-
Target
739003fabfa0179bc5d607489bbf79d20a984993a31721fcc9fafefff4010cac.exe
-
Size
429KB
-
MD5
08ef62033515e5036d20fb851ed5028c
-
SHA1
39a4276cde4368f377de8796f11fd2135a9ab7a5
-
SHA256
739003fabfa0179bc5d607489bbf79d20a984993a31721fcc9fafefff4010cac
-
SHA512
3f7da0b9c49f6d5931f063b65f77287c252655cdd59621715aa5af472453bcae617f2fadb1a1036cbc4e1f497421b285e096bab5e836fea2cdee182722acf120
-
SSDEEP
6144:WD+UC5zn42swT2E47RMEpWzIiRojL6xLsVz6xkY72wcqOYFQWhBdqMXBrwUbWpyU:WU4JJrrWzXOLBR6eYiC2G7pBrdbpx8f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ohcev.exepid process 2964 ohcev.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ohcev.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run ohcev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ohcev = "C:\\Users\\Admin\\AppData\\Roaming\\Ujoc\\ohcev.exe" ohcev.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
739003fabfa0179bc5d607489bbf79d20a984993a31721fcc9fafefff4010cac.exedescription pid process target process PID 1652 set thread context of 3860 1652 739003fabfa0179bc5d607489bbf79d20a984993a31721fcc9fafefff4010cac.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ohcev.exepid process 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe 2964 ohcev.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
739003fabfa0179bc5d607489bbf79d20a984993a31721fcc9fafefff4010cac.exeohcev.exedescription pid process target process PID 1652 wrote to memory of 2964 1652 739003fabfa0179bc5d607489bbf79d20a984993a31721fcc9fafefff4010cac.exe ohcev.exe PID 1652 wrote to memory of 2964 1652 739003fabfa0179bc5d607489bbf79d20a984993a31721fcc9fafefff4010cac.exe ohcev.exe PID 1652 wrote to memory of 2964 1652 739003fabfa0179bc5d607489bbf79d20a984993a31721fcc9fafefff4010cac.exe ohcev.exe PID 2964 wrote to memory of 2464 2964 ohcev.exe sihost.exe PID 2964 wrote to memory of 2464 2964 ohcev.exe sihost.exe PID 2964 wrote to memory of 2464 2964 ohcev.exe sihost.exe PID 2964 wrote to memory of 2464 2964 ohcev.exe sihost.exe PID 2964 wrote to memory of 2464 2964 ohcev.exe sihost.exe PID 2964 wrote to memory of 2476 2964 ohcev.exe svchost.exe PID 2964 wrote to memory of 2476 2964 ohcev.exe svchost.exe PID 2964 wrote to memory of 2476 2964 ohcev.exe svchost.exe PID 2964 wrote to memory of 2476 2964 ohcev.exe svchost.exe PID 2964 wrote to memory of 2476 2964 ohcev.exe svchost.exe PID 2964 wrote to memory of 2556 2964 ohcev.exe taskhostw.exe PID 2964 wrote to memory of 2556 2964 ohcev.exe taskhostw.exe PID 2964 wrote to memory of 2556 2964 ohcev.exe taskhostw.exe PID 2964 wrote to memory of 2556 2964 ohcev.exe taskhostw.exe PID 2964 wrote to memory of 2556 2964 ohcev.exe taskhostw.exe PID 2964 wrote to memory of 2616 2964 ohcev.exe Explorer.EXE PID 2964 wrote to memory of 2616 2964 ohcev.exe Explorer.EXE PID 2964 wrote to memory of 2616 2964 ohcev.exe Explorer.EXE PID 2964 wrote to memory of 2616 2964 ohcev.exe Explorer.EXE PID 2964 wrote to memory of 2616 2964 ohcev.exe Explorer.EXE PID 2964 wrote to memory of 3060 2964 ohcev.exe svchost.exe PID 2964 wrote to memory of 3060 2964 ohcev.exe svchost.exe PID 2964 wrote to memory of 3060 2964 ohcev.exe svchost.exe PID 2964 wrote to memory of 3060 2964 ohcev.exe svchost.exe PID 2964 wrote to memory of 3060 2964 ohcev.exe svchost.exe PID 2964 wrote to memory of 3256 2964 ohcev.exe DllHost.exe PID 2964 wrote to memory of 3256 2964 ohcev.exe DllHost.exe PID 2964 wrote to memory of 3256 2964 ohcev.exe DllHost.exe PID 2964 wrote to memory of 3256 2964 ohcev.exe DllHost.exe PID 2964 wrote to memory of 3256 2964 ohcev.exe DllHost.exe PID 2964 wrote to memory of 3352 2964 ohcev.exe StartMenuExperienceHost.exe PID 2964 wrote to memory of 3352 2964 ohcev.exe StartMenuExperienceHost.exe PID 2964 wrote to memory of 3352 2964 ohcev.exe StartMenuExperienceHost.exe PID 2964 wrote to memory of 3352 2964 ohcev.exe StartMenuExperienceHost.exe PID 2964 wrote to memory of 3352 2964 ohcev.exe StartMenuExperienceHost.exe PID 2964 wrote to memory of 3424 2964 ohcev.exe RuntimeBroker.exe PID 2964 wrote to memory of 3424 2964 ohcev.exe RuntimeBroker.exe PID 2964 wrote to memory of 3424 2964 ohcev.exe RuntimeBroker.exe PID 2964 wrote to memory of 3424 2964 ohcev.exe RuntimeBroker.exe PID 2964 wrote to memory of 3424 2964 ohcev.exe RuntimeBroker.exe PID 2964 wrote to memory of 3512 2964 ohcev.exe SearchApp.exe PID 2964 wrote to memory of 3512 2964 ohcev.exe SearchApp.exe PID 2964 wrote to memory of 3512 2964 ohcev.exe SearchApp.exe PID 2964 wrote to memory of 3512 2964 ohcev.exe SearchApp.exe PID 2964 wrote to memory of 3512 2964 ohcev.exe SearchApp.exe PID 2964 wrote to memory of 3664 2964 ohcev.exe RuntimeBroker.exe PID 2964 wrote to memory of 3664 2964 ohcev.exe RuntimeBroker.exe PID 2964 wrote to memory of 3664 2964 ohcev.exe RuntimeBroker.exe PID 2964 wrote to memory of 3664 2964 ohcev.exe RuntimeBroker.exe PID 2964 wrote to memory of 3664 2964 ohcev.exe RuntimeBroker.exe PID 2964 wrote to memory of 4512 2964 ohcev.exe RuntimeBroker.exe PID 2964 wrote to memory of 4512 2964 ohcev.exe RuntimeBroker.exe PID 2964 wrote to memory of 4512 2964 ohcev.exe RuntimeBroker.exe PID 2964 wrote to memory of 4512 2964 ohcev.exe RuntimeBroker.exe PID 2964 wrote to memory of 4512 2964 ohcev.exe RuntimeBroker.exe PID 2964 wrote to memory of 4992 2964 ohcev.exe backgroundTaskHost.exe PID 2964 wrote to memory of 4992 2964 ohcev.exe backgroundTaskHost.exe PID 2964 wrote to memory of 4992 2964 ohcev.exe backgroundTaskHost.exe PID 2964 wrote to memory of 4992 2964 ohcev.exe backgroundTaskHost.exe PID 2964 wrote to memory of 4992 2964 ohcev.exe backgroundTaskHost.exe PID 2964 wrote to memory of 4980 2964 ohcev.exe backgroundTaskHost.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3060
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3424
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3664
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3512
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3352
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3256
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\739003fabfa0179bc5d607489bbf79d20a984993a31721fcc9fafefff4010cac.exe"C:\Users\Admin\AppData\Local\Temp\739003fabfa0179bc5d607489bbf79d20a984993a31721fcc9fafefff4010cac.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Roaming\Ujoc\ohcev.exe"C:\Users\Admin\AppData\Roaming\Ujoc\ohcev.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BNDB6DC.bat"3⤵PID:3860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4656
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4512
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2556
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2476
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4980
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4992
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4716
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:5112
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2608
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:1432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD5d4a5568001cd0df145eb7fd186e2bb0b
SHA18cd2b7a4d4456f77eed2ea465387ce05876f51a9
SHA2569fd21579c7a9bed21350fc40ad42b58cc17bacba9ae7370a2d75c6f6a93fcccf
SHA512086a0a3db9acccf599eb4c9bb1db036350cac86c57e107bf2745391d890b65c15726ca7b85c4d530549f09a64b4fb79ba09fd4cdbf94a50920a6a002681f9fbd
-
Filesize
429KB
MD51c71e7281eaa5fe6e88288bac680e6ac
SHA1300bb88c3873a437a6c2879173d6aa74699385f6
SHA256e755cd6160be5296e82400a3b24d148a52153e72fae332e1d663848314a57d63
SHA5127dbb84e171c17f494fe68942652d5807aab17eaf0dd5c248213657f18e146cec175243dd12601016b08d27766f3db9c514412a1fd9e650f76f9b02abde379bbe
-
Filesize
429KB
MD51c71e7281eaa5fe6e88288bac680e6ac
SHA1300bb88c3873a437a6c2879173d6aa74699385f6
SHA256e755cd6160be5296e82400a3b24d148a52153e72fae332e1d663848314a57d63
SHA5127dbb84e171c17f494fe68942652d5807aab17eaf0dd5c248213657f18e146cec175243dd12601016b08d27766f3db9c514412a1fd9e650f76f9b02abde379bbe