Analysis
-
max time kernel
184s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 22:18
Static task
static1
Behavioral task
behavioral1
Sample
CF߱Ѫո.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
CF߱Ѫո.exe
Resource
win10v2004-20220812-en
General
-
Target
CF߱Ѫո.exe
-
Size
1.6MB
-
MD5
1422e92ffa3406459b8b5b4fbed745a3
-
SHA1
7ab2ea8c0e4bb988ba81c7f7e87debf988832780
-
SHA256
84c2594bfaaedf7007662025c4beafdad536a3308f8c3f6ee52d083450a66b57
-
SHA512
908c955b0fbcd33677eb132d0f774defbca40903138b3ecea64adef74251aa58889820520842fb9e191b3ed5b72e4ac759e99bab20032a7d00b200a896ab7646
-
SSDEEP
24576:cb4wCwg9BO+64wI3h4sDsRuYqTXwgKw4v1TuSSx218pij8p+:cdCB3n3h4tuSjGE18E88
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
DDtt5.exepid process 2824 DDtt5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
CF߱Ѫո.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ÎÒµÄÆô¶¯Ïî = "C:\\Windows\\system32\\/DDtt5.exe" CF߱Ѫո.exe -
Drops file in System32 directory 1 IoCs
Processes:
CF߱Ѫո.exedescription ioc process File created C:\Windows\SysWOW64\DDtt5.exe CF߱Ѫո.exe -
Processes:
CF߱Ѫո.exeDDtt5.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main CF߱Ѫո.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\GPU DDtt5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"6.2.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" DDtt5.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
CF߱Ѫո.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "www.2345.com/?keyybc" CF߱Ѫո.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
CF߱Ѫո.exepid process 4204 CF߱Ѫո.exe 4204 CF߱Ѫո.exe 4204 CF߱Ѫո.exe 4204 CF߱Ѫո.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
CF߱Ѫո.exeDDtt5.exepid process 4204 CF߱Ѫո.exe 4204 CF߱Ѫո.exe 2824 DDtt5.exe 2824 DDtt5.exe 2824 DDtt5.exe 2824 DDtt5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
CF߱Ѫո.exedescription pid process target process PID 4204 wrote to memory of 2824 4204 CF߱Ѫո.exe DDtt5.exe PID 4204 wrote to memory of 2824 4204 CF߱Ѫո.exe DDtt5.exe PID 4204 wrote to memory of 2824 4204 CF߱Ѫո.exe DDtt5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CF߱Ѫո.exe"C:\Users\Admin\AppData\Local\Temp\CF߱Ѫո.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\DDtt5.exeC:\Windows\system32\/DDtt5.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
860KB
MD5b2d6bacc36f7bd353333e0b420f26d40
SHA1fc6d42b77e8d897fc5c871d89aa7a646c43a7394
SHA2566f5451d9d64e6b0c45a17ef0f418f2d43995e2ca384786fb7ccabd49210544bc
SHA512bb840dd25e808a434fa5934d33c64fd94ae1946412e97f72d9c6e06e3cf85d2783d9ded3cb75e38ea42671b178a45fde1124acddce286508aba6e9e0e58746a1
-
Filesize
860KB
MD5b2d6bacc36f7bd353333e0b420f26d40
SHA1fc6d42b77e8d897fc5c871d89aa7a646c43a7394
SHA2566f5451d9d64e6b0c45a17ef0f418f2d43995e2ca384786fb7ccabd49210544bc
SHA512bb840dd25e808a434fa5934d33c64fd94ae1946412e97f72d9c6e06e3cf85d2783d9ded3cb75e38ea42671b178a45fde1124acddce286508aba6e9e0e58746a1