Analysis
-
max time kernel
147s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 08:18
Behavioral task
behavioral1
Sample
c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe
Resource
win10v2004-20220901-en
General
-
Target
c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe
-
Size
242KB
-
MD5
cff078a378be69bcb188ae82559befad
-
SHA1
f1d9a3f6644e1adea48f935e7e241be056323cf6
-
SHA256
c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a
-
SHA512
a0a108f50df76950a02709dbb3ebcb18437c4e94bc27ad39c1814d96124986b0ea6f889bef5b82a90241e13e4f373a7fd2b777f6e761d3214045894eae7eae96
-
SSDEEP
6144:vNxPDGQKvPKjyfptBrAM7R8mNN5F2XCrC0+e:vNxPjKnKjyx7jx2yjp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01pid process 4376 c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01 -
Processes:
resource yara_rule behavioral2/memory/1092-138-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exec18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01pid process 1092 c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe 4376 c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01 -
Drops file in System32 directory 1 IoCs
Processes:
c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exedescription ioc process File created C:\Windows\SysWOW64\SYSLIB32.DLL c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe -
Drops file in Program Files directory 18 IoCs
Processes:
c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exedescription ioc process File opened for modification C:\PROGRAM FILES\7-ZIP\7Z.ECJ c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZFM.FDN c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZG.EXE c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File created C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\APPVCLEANER.BHD c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\APPVCLEANER.EXE c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File created C:\PROGRAM FILES\7-ZIP\7ZFM.FDN c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File created C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\INSPECTOROFFICEGADGET.ODJ c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\INSPECTOROFFICEGADGET.ODJ c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\INSPECTOROFFICEGADGET.EXE c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7Z.EXE c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File created C:\PROGRAM FILES\7-ZIP\7ZG.HMQ c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File created C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\APPVSHNOTIFY.TTR c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\APPVSHNOTIFY.TTR c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File created C:\PROGRAM FILES\7-ZIP\7Z.ECJ c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZFM.EXE c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZG.HMQ c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\APPVCLEANER.BHD c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\APPVSHNOTIFY.EXE c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exec18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01pid process 1092 c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe 1092 c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe 4376 c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01 4376 c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01 4376 c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01 -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exec18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01description pid process target process PID 1092 wrote to memory of 4376 1092 c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01 PID 1092 wrote to memory of 4376 1092 c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01 PID 1092 wrote to memory of 4376 1092 c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01 PID 4376 wrote to memory of 4912 4376 c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01 splwow64.exe PID 4376 wrote to memory of 4912 4376 c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01 splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe"C:\Users\Admin\AppData\Local\Temp\c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01C:\Users\Admin\AppData\Local\Temp\c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~012⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01Filesize
209KB
MD5f0543aceeb5cd8821469958c9f3dd9a4
SHA1e6168bf90e183adb69946b43ead5403a445db35b
SHA2560de66bbc4b400dbe5aa5ca694ec7e504060b8d3d1560c755096aea5fd2b5ab25
SHA512304dc042be5a4de1acd7e895a415c80d59f995b16ba9968c44b0adf40d8b3475c7f238f42db8f38c7343347a3600fb34f77d786c868362d5a875efc39fdccd79
-
C:\Users\Admin\AppData\Local\Temp\c18e948ec26d7d17f6501aea346193e1713ac8ae7f3d283cb4297344ea28175a.~01Filesize
209KB
MD5f0543aceeb5cd8821469958c9f3dd9a4
SHA1e6168bf90e183adb69946b43ead5403a445db35b
SHA2560de66bbc4b400dbe5aa5ca694ec7e504060b8d3d1560c755096aea5fd2b5ab25
SHA512304dc042be5a4de1acd7e895a415c80d59f995b16ba9968c44b0adf40d8b3475c7f238f42db8f38c7343347a3600fb34f77d786c868362d5a875efc39fdccd79
-
C:\Windows\SysWOW64\SYSLIB32.DLLFilesize
4KB
MD5f14bd85eeba2b828a655fe62931035e5
SHA1c6f962ab17705248f1c54675f3f02ee162d5a2b9
SHA25678350b4add47b0ffa7ad91912fd3937afe19671b08df79463abcbedb12e470db
SHA5129a825d7976e42259f7396e9bc174ae76a12e3464b7ea452270105a5510f97388c757c70d973fc94eefb715862e3b6c99edbd86b6ca936cd6670c7f3b7ea6fde2
-
C:\Windows\SysWOW64\SYSLIB32.DLLFilesize
4KB
MD5f14bd85eeba2b828a655fe62931035e5
SHA1c6f962ab17705248f1c54675f3f02ee162d5a2b9
SHA25678350b4add47b0ffa7ad91912fd3937afe19671b08df79463abcbedb12e470db
SHA5129a825d7976e42259f7396e9bc174ae76a12e3464b7ea452270105a5510f97388c757c70d973fc94eefb715862e3b6c99edbd86b6ca936cd6670c7f3b7ea6fde2
-
C:\Windows\SysWOW64\SYSLIB32.DLLFilesize
4KB
MD5f14bd85eeba2b828a655fe62931035e5
SHA1c6f962ab17705248f1c54675f3f02ee162d5a2b9
SHA25678350b4add47b0ffa7ad91912fd3937afe19671b08df79463abcbedb12e470db
SHA5129a825d7976e42259f7396e9bc174ae76a12e3464b7ea452270105a5510f97388c757c70d973fc94eefb715862e3b6c99edbd86b6ca936cd6670c7f3b7ea6fde2
-
memory/1092-138-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1092-139-0x0000000010000000-0x0000000010005000-memory.dmpFilesize
20KB
-
memory/4376-132-0x0000000000000000-mapping.dmp
-
memory/4912-140-0x0000000000000000-mapping.dmp