Analysis
-
max time kernel
174s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:09
Static task
static1
Behavioral task
behavioral1
Sample
4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe
Resource
win10v2004-20221111-en
General
-
Target
4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe
-
Size
373KB
-
MD5
807344844ea9ef4c5c5eebf60775f884
-
SHA1
feb2b4c90077973c337dfa6fd5a96076c8b7b84f
-
SHA256
4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8
-
SHA512
0c8af5fbac00c2b85b533fcd645392d4c36893caa8b29f1efbf4d86955394b6cea51f0a8a6f545f3927ff788271346f2f889978d5977f63e5ca337e3b58eb0da
-
SSDEEP
6144:eAXnF5hWN3cPkLCWp+kxLaazQ/rJ6aQ/URjERT2ElYRktprr5h:eA15hy3cPkLXp+k5bzQ/V6a/54eurb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
hixe.exepid process 1408 hixe.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 916 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exepid process 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
hixe.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\Currentversion\Run hixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7B2FDFC8-3774-AD4D-C411-AE4FF0968D52} = "C:\\Users\\Admin\\AppData\\Roaming\\Joozce\\hixe.exe" hixe.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exedescription pid process target process PID 1648 set thread context of 916 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe cmd.exe -
Processes:
4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
hixe.exepid process 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe 1408 hixe.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exehixe.exepid process 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe 1408 hixe.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exehixe.exedescription pid process target process PID 1648 wrote to memory of 1408 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe hixe.exe PID 1648 wrote to memory of 1408 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe hixe.exe PID 1648 wrote to memory of 1408 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe hixe.exe PID 1648 wrote to memory of 1408 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe hixe.exe PID 1408 wrote to memory of 1124 1408 hixe.exe taskhost.exe PID 1408 wrote to memory of 1124 1408 hixe.exe taskhost.exe PID 1408 wrote to memory of 1124 1408 hixe.exe taskhost.exe PID 1408 wrote to memory of 1124 1408 hixe.exe taskhost.exe PID 1408 wrote to memory of 1124 1408 hixe.exe taskhost.exe PID 1408 wrote to memory of 1208 1408 hixe.exe Dwm.exe PID 1408 wrote to memory of 1208 1408 hixe.exe Dwm.exe PID 1408 wrote to memory of 1208 1408 hixe.exe Dwm.exe PID 1408 wrote to memory of 1208 1408 hixe.exe Dwm.exe PID 1408 wrote to memory of 1208 1408 hixe.exe Dwm.exe PID 1408 wrote to memory of 1244 1408 hixe.exe Explorer.EXE PID 1408 wrote to memory of 1244 1408 hixe.exe Explorer.EXE PID 1408 wrote to memory of 1244 1408 hixe.exe Explorer.EXE PID 1408 wrote to memory of 1244 1408 hixe.exe Explorer.EXE PID 1408 wrote to memory of 1244 1408 hixe.exe Explorer.EXE PID 1408 wrote to memory of 1648 1408 hixe.exe 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe PID 1408 wrote to memory of 1648 1408 hixe.exe 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe PID 1408 wrote to memory of 1648 1408 hixe.exe 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe PID 1408 wrote to memory of 1648 1408 hixe.exe 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe PID 1408 wrote to memory of 1648 1408 hixe.exe 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe PID 1648 wrote to memory of 916 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe cmd.exe PID 1648 wrote to memory of 916 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe cmd.exe PID 1648 wrote to memory of 916 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe cmd.exe PID 1648 wrote to memory of 916 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe cmd.exe PID 1648 wrote to memory of 916 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe cmd.exe PID 1648 wrote to memory of 916 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe cmd.exe PID 1648 wrote to memory of 916 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe cmd.exe PID 1648 wrote to memory of 916 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe cmd.exe PID 1648 wrote to memory of 916 1648 4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe cmd.exe PID 1408 wrote to memory of 600 1408 hixe.exe conhost.exe PID 1408 wrote to memory of 600 1408 hixe.exe conhost.exe PID 1408 wrote to memory of 600 1408 hixe.exe conhost.exe PID 1408 wrote to memory of 600 1408 hixe.exe conhost.exe PID 1408 wrote to memory of 600 1408 hixe.exe conhost.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1208
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe"C:\Users\Admin\AppData\Local\Temp\4a0d16c278af3e1dae3f83145a4e18435988210187b615b04fa79cd115a5dbd8.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Roaming\Joozce\hixe.exe"C:\Users\Admin\AppData\Roaming\Joozce\hixe.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp51ef7e70.bat"3⤵
- Deletes itself
PID:916
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1610666947-6133363717995325851953933309-949269844-1792436431-2088822021-1699625263"1⤵PID:600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
837B
MD55c4ae110a11ef3ccc52ef53aa850368d
SHA1eeeec644e2cde80a1e68a314cb81449b52c97812
SHA256eda2af808a2ab84c891eb5baf058475c0e67a6892083b5d16bcad68ea4098439
SHA51263b8f0330ce36bb63b27a504b5160b8360d71782458dc486fac3acb186cdbc70b55884be28c45365060547586ff45de75f7cc09c18220c06ad4c535710aed9b7
-
Filesize
307B
MD570c3af3a9ee9ac969c242cfc7ccefc1e
SHA111800624e5e05c4bd7c974ed878441709ff03eb3
SHA25619abdd782bd1fc323e49798e193a4d33e30b7b43a3a19c8acf27bacf632d0574
SHA5123352d47a90dc7cd72f5b13173679750038f5db05a001ad5852599c7f7a5ea25fdd5d7eb1902158a70548e61f0b185b76962dce85ec7f0ab48d84bbbb0fa15823
-
Filesize
373KB
MD56b83acf5671b7a7286e8d4b27113389d
SHA1bc86852cbe53f90a6f7b7916f208e158f5ad5250
SHA2569112418bb196351d085613871cbeb2fa4d775de4bbcc6dc96246a053a2c1a1f2
SHA512e17419324773993d4ac425059228bb705c931b99058e411a9f6603e35b4f9cb5d51f455c8cd09b1249ca2484f84346149df82a837cd7c5fa21ade7051c80dd99
-
Filesize
373KB
MD56b83acf5671b7a7286e8d4b27113389d
SHA1bc86852cbe53f90a6f7b7916f208e158f5ad5250
SHA2569112418bb196351d085613871cbeb2fa4d775de4bbcc6dc96246a053a2c1a1f2
SHA512e17419324773993d4ac425059228bb705c931b99058e411a9f6603e35b4f9cb5d51f455c8cd09b1249ca2484f84346149df82a837cd7c5fa21ade7051c80dd99
-
Filesize
373KB
MD56b83acf5671b7a7286e8d4b27113389d
SHA1bc86852cbe53f90a6f7b7916f208e158f5ad5250
SHA2569112418bb196351d085613871cbeb2fa4d775de4bbcc6dc96246a053a2c1a1f2
SHA512e17419324773993d4ac425059228bb705c931b99058e411a9f6603e35b4f9cb5d51f455c8cd09b1249ca2484f84346149df82a837cd7c5fa21ade7051c80dd99
-
Filesize
373KB
MD56b83acf5671b7a7286e8d4b27113389d
SHA1bc86852cbe53f90a6f7b7916f208e158f5ad5250
SHA2569112418bb196351d085613871cbeb2fa4d775de4bbcc6dc96246a053a2c1a1f2
SHA512e17419324773993d4ac425059228bb705c931b99058e411a9f6603e35b4f9cb5d51f455c8cd09b1249ca2484f84346149df82a837cd7c5fa21ade7051c80dd99