Analysis
-
max time kernel
168s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 16:50
Static task
static1
Behavioral task
behavioral1
Sample
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe
Resource
win10v2004-20221111-en
General
-
Target
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe
-
Size
120KB
-
MD5
4b0deafcd4b691e0e573891162b56483
-
SHA1
e6c30cb98b89fd478b7117caffa02a1a12e84a09
-
SHA256
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857
-
SHA512
c97ced370db53336bd42a70a33f967eceb2cb77509a6e147790a03845aa97800743dd5f97342bcb20894bd713ec442a36489fec695c10f39f798a8e9628c11dc
-
SSDEEP
1536:iIdcFLZp0dsrYgdRAgH0/m38wIJVOy2JDVhCK8PTSuB:iIdcFLEdskgrt05bnwhVh6PTP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
idemoodp0cetka.exeidemoodp0cetka.exepid process 1740 idemoodp0cetka.exe 1772 idemoodp0cetka.exe -
Loads dropped DLL 3 IoCs
Processes:
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exeidemoodp0cetka.exepid process 1676 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 1676 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 1740 idemoodp0cetka.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exeidemoodp0cetka.exedescription pid process target process PID 1788 set thread context of 1676 1788 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 1740 set thread context of 1772 1740 idemoodp0cetka.exe idemoodp0cetka.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exeidemoodp0cetka.exepid process 1788 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 1740 idemoodp0cetka.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exeidemoodp0cetka.exedescription pid process target process PID 1788 wrote to memory of 1676 1788 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 1788 wrote to memory of 1676 1788 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 1788 wrote to memory of 1676 1788 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 1788 wrote to memory of 1676 1788 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 1788 wrote to memory of 1676 1788 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 1788 wrote to memory of 1676 1788 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 1788 wrote to memory of 1676 1788 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 1788 wrote to memory of 1676 1788 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 1788 wrote to memory of 1676 1788 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 1676 wrote to memory of 1740 1676 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe idemoodp0cetka.exe PID 1676 wrote to memory of 1740 1676 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe idemoodp0cetka.exe PID 1676 wrote to memory of 1740 1676 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe idemoodp0cetka.exe PID 1676 wrote to memory of 1740 1676 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe idemoodp0cetka.exe PID 1740 wrote to memory of 1772 1740 idemoodp0cetka.exe idemoodp0cetka.exe PID 1740 wrote to memory of 1772 1740 idemoodp0cetka.exe idemoodp0cetka.exe PID 1740 wrote to memory of 1772 1740 idemoodp0cetka.exe idemoodp0cetka.exe PID 1740 wrote to memory of 1772 1740 idemoodp0cetka.exe idemoodp0cetka.exe PID 1740 wrote to memory of 1772 1740 idemoodp0cetka.exe idemoodp0cetka.exe PID 1740 wrote to memory of 1772 1740 idemoodp0cetka.exe idemoodp0cetka.exe PID 1740 wrote to memory of 1772 1740 idemoodp0cetka.exe idemoodp0cetka.exe PID 1740 wrote to memory of 1772 1740 idemoodp0cetka.exe idemoodp0cetka.exe PID 1740 wrote to memory of 1772 1740 idemoodp0cetka.exe idemoodp0cetka.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe"C:\Users\Admin\AppData\Local\Temp\3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe"C:\Users\Admin\AppData\Local\Temp\3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"4⤵
- Executes dropped EXE
PID:1772
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD54b0deafcd4b691e0e573891162b56483
SHA1e6c30cb98b89fd478b7117caffa02a1a12e84a09
SHA2563ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857
SHA512c97ced370db53336bd42a70a33f967eceb2cb77509a6e147790a03845aa97800743dd5f97342bcb20894bd713ec442a36489fec695c10f39f798a8e9628c11dc
-
Filesize
120KB
MD54b0deafcd4b691e0e573891162b56483
SHA1e6c30cb98b89fd478b7117caffa02a1a12e84a09
SHA2563ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857
SHA512c97ced370db53336bd42a70a33f967eceb2cb77509a6e147790a03845aa97800743dd5f97342bcb20894bd713ec442a36489fec695c10f39f798a8e9628c11dc
-
Filesize
120KB
MD54b0deafcd4b691e0e573891162b56483
SHA1e6c30cb98b89fd478b7117caffa02a1a12e84a09
SHA2563ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857
SHA512c97ced370db53336bd42a70a33f967eceb2cb77509a6e147790a03845aa97800743dd5f97342bcb20894bd713ec442a36489fec695c10f39f798a8e9628c11dc
-
Filesize
120KB
MD54b0deafcd4b691e0e573891162b56483
SHA1e6c30cb98b89fd478b7117caffa02a1a12e84a09
SHA2563ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857
SHA512c97ced370db53336bd42a70a33f967eceb2cb77509a6e147790a03845aa97800743dd5f97342bcb20894bd713ec442a36489fec695c10f39f798a8e9628c11dc
-
Filesize
120KB
MD54b0deafcd4b691e0e573891162b56483
SHA1e6c30cb98b89fd478b7117caffa02a1a12e84a09
SHA2563ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857
SHA512c97ced370db53336bd42a70a33f967eceb2cb77509a6e147790a03845aa97800743dd5f97342bcb20894bd713ec442a36489fec695c10f39f798a8e9628c11dc
-
Filesize
120KB
MD54b0deafcd4b691e0e573891162b56483
SHA1e6c30cb98b89fd478b7117caffa02a1a12e84a09
SHA2563ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857
SHA512c97ced370db53336bd42a70a33f967eceb2cb77509a6e147790a03845aa97800743dd5f97342bcb20894bd713ec442a36489fec695c10f39f798a8e9628c11dc