Analysis
-
max time kernel
51s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe
Resource
win10v2004-20221111-en
General
-
Target
8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe
-
Size
17KB
-
MD5
c23017a6c3787bde2923bdee1dc1390a
-
SHA1
3ddcd4eacbe4c6e3f11a3c9db80da9d7d976d229
-
SHA256
8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580
-
SHA512
f218cec5f0675b95657c8cf8b51347a9ee24650fdf040fd80b09abbe276274aad49973fe88aa6599465e85aba25f7af0ecffbc846ca59426336a51d84cb1894f
-
SSDEEP
384:wGxN21KGYz0iwV1vF32zjydJw96uBgyaNJawcudoD7UoxV:NY1KG8vwV5tWjUJtuBcnbcuyD7Uoj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1264 coiome.exe -
Stops running service(s) 3 TTPs
-
Deletes itself 1 IoCs
pid Process 1964 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run mshta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\safe360 = "C:\\Program Files\\Common Files\\sfbsbvx\\coiome.exe" mshta.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\sfbsbvx 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe File created C:\Program Files (x86)\WXE.hta 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe File created C:\Program Files (x86)\Common Files\sfbsbvx\coiome.exe 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe File opened for modification C:\Program Files (x86)\Common Files\sfbsbvx\coiome.exe 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe File opened for modification C:\Program Files (x86)\Common Files\sfbsbvx coiome.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1812 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 396 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.52cailing.com" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\default_page_url = "http://www.52cailing.com" mshta.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.52cailing.com" mshta.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe Token: SeDebugPrivilege 396 taskkill.exe Token: SeDebugPrivilege 1264 coiome.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1356 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 27 PID 1720 wrote to memory of 1356 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 27 PID 1720 wrote to memory of 1356 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 27 PID 1720 wrote to memory of 1356 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 27 PID 1720 wrote to memory of 660 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 29 PID 1720 wrote to memory of 660 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 29 PID 1720 wrote to memory of 660 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 29 PID 1720 wrote to memory of 660 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 29 PID 660 wrote to memory of 396 660 cmd.exe 31 PID 660 wrote to memory of 396 660 cmd.exe 31 PID 660 wrote to memory of 396 660 cmd.exe 31 PID 660 wrote to memory of 396 660 cmd.exe 31 PID 1720 wrote to memory of 1264 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 33 PID 1720 wrote to memory of 1264 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 33 PID 1720 wrote to memory of 1264 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 33 PID 1720 wrote to memory of 1264 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 33 PID 1720 wrote to memory of 1964 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 34 PID 1720 wrote to memory of 1964 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 34 PID 1720 wrote to memory of 1964 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 34 PID 1720 wrote to memory of 1964 1720 8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe 34 PID 1264 wrote to memory of 1244 1264 coiome.exe 37 PID 1264 wrote to memory of 1244 1264 coiome.exe 37 PID 1264 wrote to memory of 1244 1264 coiome.exe 37 PID 1264 wrote to memory of 1244 1264 coiome.exe 37 PID 1244 wrote to memory of 1812 1244 cmd.exe 39 PID 1244 wrote to memory of 1812 1244 cmd.exe 39 PID 1244 wrote to memory of 1812 1244 cmd.exe 39 PID 1244 wrote to memory of 1812 1244 cmd.exe 39 PID 1264 wrote to memory of 1580 1264 coiome.exe 40 PID 1264 wrote to memory of 1580 1264 coiome.exe 40 PID 1264 wrote to memory of 1580 1264 coiome.exe 40 PID 1264 wrote to memory of 1580 1264 coiome.exe 40 PID 1580 wrote to memory of 1724 1580 cmd.exe 42 PID 1580 wrote to memory of 1724 1580 cmd.exe 42 PID 1580 wrote to memory of 1724 1580 cmd.exe 42 PID 1580 wrote to memory of 1724 1580 cmd.exe 42 PID 1264 wrote to memory of 1440 1264 coiome.exe 43 PID 1264 wrote to memory of 1440 1264 coiome.exe 43 PID 1264 wrote to memory of 1440 1264 coiome.exe 43 PID 1264 wrote to memory of 1440 1264 coiome.exe 43 PID 1440 wrote to memory of 912 1440 cmd.exe 45 PID 1440 wrote to memory of 912 1440 cmd.exe 45 PID 1440 wrote to memory of 912 1440 cmd.exe 45 PID 1440 wrote to memory of 912 1440 cmd.exe 45 PID 1264 wrote to memory of 1160 1264 coiome.exe 46 PID 1264 wrote to memory of 1160 1264 coiome.exe 46 PID 1264 wrote to memory of 1160 1264 coiome.exe 46 PID 1264 wrote to memory of 1160 1264 coiome.exe 46 PID 1264 wrote to memory of 544 1264 coiome.exe 48 PID 1264 wrote to memory of 544 1264 coiome.exe 48 PID 1264 wrote to memory of 544 1264 coiome.exe 48 PID 1264 wrote to memory of 544 1264 coiome.exe 48 PID 1264 wrote to memory of 1516 1264 coiome.exe 50 PID 1264 wrote to memory of 1516 1264 coiome.exe 50 PID 1264 wrote to memory of 1516 1264 coiome.exe 50 PID 1264 wrote to memory of 1516 1264 coiome.exe 50 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1724 attrib.exe 912 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe"C:\Users\Admin\AppData\Local\Temp\8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Program Files (x86)\WXE.hta"2⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:1356
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im coiome.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im coiome.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
-
C:\Program Files (x86)\Common Files\sfbsbvx\coiome.exe"C:\Program Files (x86)\Common Files\sfbsbvx\coiome.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\cmd.execmd /c sc delete JavaServe3⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\sc.exesc delete JavaServe4⤵
- Launches sc.exe
PID:1812
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Cookies\*.*"3⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Cookies\*.*"4⤵
- Views/modifies file attributes
PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Local Settings\Temp\Cookies\*.*"4⤵
- Views/modifies file attributes
PID:912
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Cookies\*.*3⤵PID:1160
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temporary Internet Files\*.*"3⤵PID:544
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵PID:1516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\8a86c7361a46fc005c83129a520810d30195deb4f0692f1ed6a0caa3c5d48580.exe"2⤵
- Deletes itself
PID:1964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD57bc6ad33e5e8c45bd659095385a78087
SHA1aebd3381495b54595045b8ab80696d98d26ce35d
SHA256a64c7439a765bfcafee3f2711c68d811f2373fb4549dcaf9267f75e18ad475cb
SHA512c896bc56d7dcbccfffdff08c8b4bec3a4cbf992f0207e16b374331d364ac7c7bdaa8217d89cbfcc4e071ed375da3c28e9c22dae9d367a322b9b289b92987913a
-
Filesize
780B
MD5cfae0efb683986503bb789616bad8b55
SHA19325f503e9c4d97a7d06d81859f73d245a974753
SHA2568f1076023a3e05a05e9938b08398e885a516f7442a19cd0de7fd3a87f6c0ccd8
SHA512e338c41006f670cc98554f1c3a262cc7e4d9dd680bd9d77cc2b5a048a7f3b630f59df6a02fe6542df71647ce3eb7541f86bc3266fad396a9859620a7d26a942c
-
Filesize
2.0MB
MD57bc6ad33e5e8c45bd659095385a78087
SHA1aebd3381495b54595045b8ab80696d98d26ce35d
SHA256a64c7439a765bfcafee3f2711c68d811f2373fb4549dcaf9267f75e18ad475cb
SHA512c896bc56d7dcbccfffdff08c8b4bec3a4cbf992f0207e16b374331d364ac7c7bdaa8217d89cbfcc4e071ed375da3c28e9c22dae9d367a322b9b289b92987913a
-
Filesize
2.0MB
MD57bc6ad33e5e8c45bd659095385a78087
SHA1aebd3381495b54595045b8ab80696d98d26ce35d
SHA256a64c7439a765bfcafee3f2711c68d811f2373fb4549dcaf9267f75e18ad475cb
SHA512c896bc56d7dcbccfffdff08c8b4bec3a4cbf992f0207e16b374331d364ac7c7bdaa8217d89cbfcc4e071ed375da3c28e9c22dae9d367a322b9b289b92987913a