Analysis
-
max time kernel
70s -
max time network
77s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 21:34
Static task
static1
Behavioral task
behavioral1
Sample
ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe
Resource
win10v2004-20221111-en
General
-
Target
ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe
-
Size
148KB
-
MD5
1dbeee8212ba715ab6c63937976c9404
-
SHA1
b0c8f9326f575363275be2c7a1bab7b884e4e028
-
SHA256
ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019
-
SHA512
93dac0afac2b95bbad99368811c2aea1ca6ef50a34f7bb70a183c70643f56fdf1fbbf1c13d21a9dbfc2f393c8e1e150cb86161f0cd30e66969887e7b5891897d
-
SSDEEP
3072:utoxi/iMEn+t1u42T2P4JE15dydO5b6Q0lel2qX:umi/iMDtQRT2PvpWwMqX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run EXPLORER.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2ECCC85B = "C:\\Users\\Admin\\AppData\\Roaming\\2ECCC85B\\bin.exe" EXPLORER.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1668 set thread context of 4148 1668 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe 84 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1668 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe 1668 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe 2832 EXPLORER.exe 2832 EXPLORER.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1668 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe 1668 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1668 wrote to memory of 4148 1668 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe 84 PID 1668 wrote to memory of 4148 1668 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe 84 PID 1668 wrote to memory of 4148 1668 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe 84 PID 1668 wrote to memory of 4148 1668 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe 84 PID 1668 wrote to memory of 4148 1668 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe 84 PID 1668 wrote to memory of 4148 1668 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe 84 PID 1668 wrote to memory of 4148 1668 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe 84 PID 4148 wrote to memory of 2832 4148 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe 85 PID 4148 wrote to memory of 2832 4148 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe 85 PID 4148 wrote to memory of 2832 4148 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe 85 PID 4148 wrote to memory of 2832 4148 ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe 85 PID 2832 wrote to memory of 2708 2832 EXPLORER.exe 26 PID 2832 wrote to memory of 2816 2832 EXPLORER.exe 57 PID 2832 wrote to memory of 2864 2832 EXPLORER.exe 56 PID 2832 wrote to memory of 764 2832 EXPLORER.exe 54 PID 2832 wrote to memory of 2892 2832 EXPLORER.exe 27 PID 2832 wrote to memory of 3256 2832 EXPLORER.exe 53
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:2892
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3256
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe"C:\Users\Admin\AppData\Local\Temp\ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe"C:\Users\Admin\AppData\Local\Temp\ccd68df63f0b4cd030fc9d1617ba4c0af36926b626996565503bfef2e9488019.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\EXPLORER.exeEXPLORER4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832
-
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2864
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2816