Analysis
-
max time kernel
186s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 16:50
Static task
static1
Behavioral task
behavioral1
Sample
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe
Resource
win10v2004-20221111-en
General
-
Target
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe
-
Size
120KB
-
MD5
4b0deafcd4b691e0e573891162b56483
-
SHA1
e6c30cb98b89fd478b7117caffa02a1a12e84a09
-
SHA256
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857
-
SHA512
c97ced370db53336bd42a70a33f967eceb2cb77509a6e147790a03845aa97800743dd5f97342bcb20894bd713ec442a36489fec695c10f39f798a8e9628c11dc
-
SSDEEP
1536:iIdcFLZp0dsrYgdRAgH0/m38wIJVOy2JDVhCK8PTSuB:iIdcFLEdskgrt05bnwhVh6PTP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
idemoodp0cetka.exeidemoodp0cetka.exepid process 3892 idemoodp0cetka.exe 220 idemoodp0cetka.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exeidemoodp0cetka.exedescription pid process target process PID 3976 set thread context of 4216 3976 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 3892 set thread context of 220 3892 idemoodp0cetka.exe idemoodp0cetka.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exeidemoodp0cetka.exepid process 3976 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3892 idemoodp0cetka.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exeidemoodp0cetka.exedescription pid process target process PID 3976 wrote to memory of 4216 3976 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 3976 wrote to memory of 4216 3976 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 3976 wrote to memory of 4216 3976 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 3976 wrote to memory of 4216 3976 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 3976 wrote to memory of 4216 3976 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 3976 wrote to memory of 4216 3976 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 3976 wrote to memory of 4216 3976 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 3976 wrote to memory of 4216 3976 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe PID 4216 wrote to memory of 3892 4216 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe idemoodp0cetka.exe PID 4216 wrote to memory of 3892 4216 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe idemoodp0cetka.exe PID 4216 wrote to memory of 3892 4216 3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe idemoodp0cetka.exe PID 3892 wrote to memory of 220 3892 idemoodp0cetka.exe idemoodp0cetka.exe PID 3892 wrote to memory of 220 3892 idemoodp0cetka.exe idemoodp0cetka.exe PID 3892 wrote to memory of 220 3892 idemoodp0cetka.exe idemoodp0cetka.exe PID 3892 wrote to memory of 220 3892 idemoodp0cetka.exe idemoodp0cetka.exe PID 3892 wrote to memory of 220 3892 idemoodp0cetka.exe idemoodp0cetka.exe PID 3892 wrote to memory of 220 3892 idemoodp0cetka.exe idemoodp0cetka.exe PID 3892 wrote to memory of 220 3892 idemoodp0cetka.exe idemoodp0cetka.exe PID 3892 wrote to memory of 220 3892 idemoodp0cetka.exe idemoodp0cetka.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe"C:\Users\Admin\AppData\Local\Temp\3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe"C:\Users\Admin\AppData\Local\Temp\3ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"4⤵
- Executes dropped EXE
PID:220
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD54b0deafcd4b691e0e573891162b56483
SHA1e6c30cb98b89fd478b7117caffa02a1a12e84a09
SHA2563ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857
SHA512c97ced370db53336bd42a70a33f967eceb2cb77509a6e147790a03845aa97800743dd5f97342bcb20894bd713ec442a36489fec695c10f39f798a8e9628c11dc
-
Filesize
120KB
MD54b0deafcd4b691e0e573891162b56483
SHA1e6c30cb98b89fd478b7117caffa02a1a12e84a09
SHA2563ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857
SHA512c97ced370db53336bd42a70a33f967eceb2cb77509a6e147790a03845aa97800743dd5f97342bcb20894bd713ec442a36489fec695c10f39f798a8e9628c11dc
-
Filesize
120KB
MD54b0deafcd4b691e0e573891162b56483
SHA1e6c30cb98b89fd478b7117caffa02a1a12e84a09
SHA2563ed7a239ba716214365a39793898c085c0f4dd838fed8f0229d88462db559857
SHA512c97ced370db53336bd42a70a33f967eceb2cb77509a6e147790a03845aa97800743dd5f97342bcb20894bd713ec442a36489fec695c10f39f798a8e9628c11dc