Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 22:11
Static task
static1
Behavioral task
behavioral1
Sample
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe
Resource
win10v2004-20220812-en
General
-
Target
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe
-
Size
356KB
-
MD5
74e3ff0c5c8197632150eeec60cd7b31
-
SHA1
1f97492ee077619f12edd691d3da6cc664b9e8b5
-
SHA256
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93
-
SHA512
e36766c2a2472543b5a842936dfa699d5ef2ea2cdd531e617dde159e9b7ff7cff5056e351c547d44fe95555e7d9f75e7b88be9260072c2aba889270360fb3c91
-
SSDEEP
6144:b0hjEofEPGFtb33s/BeS2l1e/B6p3GcxYsqd0wPPqDWESkmJQwIqX0ufO:b6jxfEuF53s/K1eE3Fx8hhG
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
couv.execouv.exepid process 1096 couv.exe 956 couv.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 952 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exepid process 1828 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 1828 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
couv.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run couv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{6FB5EB02-BA00-EA16-973A-5E67D3C48179} = "C:\\Users\\Admin\\AppData\\Roaming\\Igibt\\couv.exe" couv.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.execouv.exedescription pid process target process PID 1044 set thread context of 1828 1044 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1096 set thread context of 956 1096 couv.exe couv.exe -
Processes:
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
couv.exepid process 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe 956 couv.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exedescription pid process Token: SeSecurityPrivilege 1828 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe Token: SeSecurityPrivilege 1828 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe Token: SeSecurityPrivilege 1828 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.execouv.exepid process 1044 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 1096 couv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.execouv.execouv.exedescription pid process target process PID 1044 wrote to memory of 1828 1044 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1044 wrote to memory of 1828 1044 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1044 wrote to memory of 1828 1044 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1044 wrote to memory of 1828 1044 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1044 wrote to memory of 1828 1044 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1044 wrote to memory of 1828 1044 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1044 wrote to memory of 1828 1044 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1044 wrote to memory of 1828 1044 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1044 wrote to memory of 1828 1044 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1828 wrote to memory of 1096 1828 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe couv.exe PID 1828 wrote to memory of 1096 1828 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe couv.exe PID 1828 wrote to memory of 1096 1828 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe couv.exe PID 1828 wrote to memory of 1096 1828 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe couv.exe PID 1096 wrote to memory of 956 1096 couv.exe couv.exe PID 1096 wrote to memory of 956 1096 couv.exe couv.exe PID 1096 wrote to memory of 956 1096 couv.exe couv.exe PID 1096 wrote to memory of 956 1096 couv.exe couv.exe PID 1096 wrote to memory of 956 1096 couv.exe couv.exe PID 1096 wrote to memory of 956 1096 couv.exe couv.exe PID 1096 wrote to memory of 956 1096 couv.exe couv.exe PID 1096 wrote to memory of 956 1096 couv.exe couv.exe PID 1096 wrote to memory of 956 1096 couv.exe couv.exe PID 956 wrote to memory of 1112 956 couv.exe taskhost.exe PID 956 wrote to memory of 1112 956 couv.exe taskhost.exe PID 956 wrote to memory of 1112 956 couv.exe taskhost.exe PID 956 wrote to memory of 1112 956 couv.exe taskhost.exe PID 956 wrote to memory of 1112 956 couv.exe taskhost.exe PID 956 wrote to memory of 1172 956 couv.exe Dwm.exe PID 956 wrote to memory of 1172 956 couv.exe Dwm.exe PID 956 wrote to memory of 1172 956 couv.exe Dwm.exe PID 956 wrote to memory of 1172 956 couv.exe Dwm.exe PID 956 wrote to memory of 1172 956 couv.exe Dwm.exe PID 956 wrote to memory of 1212 956 couv.exe Explorer.EXE PID 956 wrote to memory of 1212 956 couv.exe Explorer.EXE PID 956 wrote to memory of 1212 956 couv.exe Explorer.EXE PID 956 wrote to memory of 1212 956 couv.exe Explorer.EXE PID 956 wrote to memory of 1212 956 couv.exe Explorer.EXE PID 956 wrote to memory of 1828 956 couv.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 956 wrote to memory of 1828 956 couv.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 956 wrote to memory of 1828 956 couv.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 956 wrote to memory of 1828 956 couv.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 956 wrote to memory of 1828 956 couv.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1828 wrote to memory of 952 1828 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe cmd.exe PID 1828 wrote to memory of 952 1828 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe cmd.exe PID 1828 wrote to memory of 952 1828 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe cmd.exe PID 1828 wrote to memory of 952 1828 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe cmd.exe PID 956 wrote to memory of 952 956 couv.exe cmd.exe PID 956 wrote to memory of 952 956 couv.exe cmd.exe PID 956 wrote to memory of 952 956 couv.exe cmd.exe PID 956 wrote to memory of 952 956 couv.exe cmd.exe PID 956 wrote to memory of 952 956 couv.exe cmd.exe PID 956 wrote to memory of 632 956 couv.exe conhost.exe PID 956 wrote to memory of 1348 956 couv.exe DllHost.exe PID 956 wrote to memory of 1348 956 couv.exe DllHost.exe PID 956 wrote to memory of 1348 956 couv.exe DllHost.exe PID 956 wrote to memory of 1348 956 couv.exe DllHost.exe PID 956 wrote to memory of 1348 956 couv.exe DllHost.exe PID 956 wrote to memory of 1696 956 couv.exe DllHost.exe PID 956 wrote to memory of 1696 956 couv.exe DllHost.exe PID 956 wrote to memory of 1696 956 couv.exe DllHost.exe PID 956 wrote to memory of 1696 956 couv.exe DllHost.exe PID 956 wrote to memory of 1696 956 couv.exe DllHost.exe PID 956 wrote to memory of 1000 956 couv.exe DllHost.exe PID 956 wrote to memory of 1000 956 couv.exe DllHost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe"C:\Users\Admin\AppData\Local\Temp\9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe"C:\Users\Admin\AppData\Local\Temp\9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Roaming\Igibt\couv.exe"C:\Users\Admin\AppData\Roaming\Igibt\couv.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Roaming\Igibt\couv.exe"C:\Users\Admin\AppData\Roaming\Igibt\couv.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp2e49d9b4.bat"4⤵
- Deletes itself
PID:952
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "3119493771438832212742793866-1665390612-63225239512350814825179880341409239703"1⤵PID:632
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1348
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1696
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5d5f424e22545ec7eb1f8f84779e7a9bc
SHA183c2723e8c305093a9367776f6f63f8e41d2400c
SHA2568fed86fa321280c8b5fd202a363ba5af76bc33017320a9e689bd16614689847e
SHA5121621c76e6ae630d96d95a3695e66287187404a28f730bc05508dcfdd9f543bc94bdd12d4123dd12ff5d75ff6242aecb98b1e7e3edfc1d7560e4ce533711e065b
-
Filesize
356KB
MD576e8a49f400d2002f5e5e8158d3e3f6a
SHA190568524016ec708ebbe2efa63b8eb42843cce1c
SHA2569a05492b418954a7154869aa3e3463693e2d1851cbd6b214c7b419c545bc4d67
SHA512902ff5f136f3bc1ea62c37455a65f6c97e6d0344123b9a5674f059da00c67eafd922ce8f1728aa46d453958b35d94110c0ca534f436d54519e373fbde75ed899
-
Filesize
356KB
MD576e8a49f400d2002f5e5e8158d3e3f6a
SHA190568524016ec708ebbe2efa63b8eb42843cce1c
SHA2569a05492b418954a7154869aa3e3463693e2d1851cbd6b214c7b419c545bc4d67
SHA512902ff5f136f3bc1ea62c37455a65f6c97e6d0344123b9a5674f059da00c67eafd922ce8f1728aa46d453958b35d94110c0ca534f436d54519e373fbde75ed899
-
Filesize
356KB
MD576e8a49f400d2002f5e5e8158d3e3f6a
SHA190568524016ec708ebbe2efa63b8eb42843cce1c
SHA2569a05492b418954a7154869aa3e3463693e2d1851cbd6b214c7b419c545bc4d67
SHA512902ff5f136f3bc1ea62c37455a65f6c97e6d0344123b9a5674f059da00c67eafd922ce8f1728aa46d453958b35d94110c0ca534f436d54519e373fbde75ed899
-
Filesize
398B
MD53c167148232874cd52c4f9a3d04ca6ea
SHA1e27b18a68988d3d457a6d71504640d544fad5471
SHA256057318f4b280e879e771a150c6eef41624e32c67dd443eb9c860d45eaf33a835
SHA51282b030e223aad498df7f74f13e97e742bdbf071bac118e9d93d00daa11369d77ad626c5a5d4ab7ecb75a2a459189f56eab093ff96c73d0401befefdc54c2a0a8
-
Filesize
356KB
MD576e8a49f400d2002f5e5e8158d3e3f6a
SHA190568524016ec708ebbe2efa63b8eb42843cce1c
SHA2569a05492b418954a7154869aa3e3463693e2d1851cbd6b214c7b419c545bc4d67
SHA512902ff5f136f3bc1ea62c37455a65f6c97e6d0344123b9a5674f059da00c67eafd922ce8f1728aa46d453958b35d94110c0ca534f436d54519e373fbde75ed899
-
Filesize
356KB
MD576e8a49f400d2002f5e5e8158d3e3f6a
SHA190568524016ec708ebbe2efa63b8eb42843cce1c
SHA2569a05492b418954a7154869aa3e3463693e2d1851cbd6b214c7b419c545bc4d67
SHA512902ff5f136f3bc1ea62c37455a65f6c97e6d0344123b9a5674f059da00c67eafd922ce8f1728aa46d453958b35d94110c0ca534f436d54519e373fbde75ed899