Overview
overview
10Static
static
10test3/08b0...8c.exe
windows7-x64
10test3/08b0...8c.exe
windows10-2004-x64
10test3/2e8b...6c.exe
windows7-x64
1test3/2e8b...6c.exe
windows10-2004-x64
1test3/5123...72.exe
windows7-x64
1test3/5123...72.exe
windows10-2004-x64
1test3/9208...80.exe
windows7-x64
1test3/9208...80.exe
windows10-2004-x64
1test3/c599...51.exe
windows7-x64
8test3/c599...51.exe
windows10-2004-x64
8test3/d1ee...9b.exe
windows7-x64
5test3/d1ee...9b.exe
windows10-2004-x64
5test3/d3a4...cd.exe
windows7-x64
1test3/d3a4...cd.exe
windows10-2004-x64
1test3/e0c7...46.exe
windows7-x64
10test3/e0c7...46.exe
windows10-2004-x64
10test3/f7ba...d1.exe
windows7-x64
1test3/f7ba...d1.exe
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2023, 07:11
Behavioral task
behavioral1
Sample
test3/08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
test3/08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
test3/2e8bcfb94561e536ee0b378b7a879f1fa0763a309f0566c40772652f0b9ee76c.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
test3/2e8bcfb94561e536ee0b378b7a879f1fa0763a309f0566c40772652f0b9ee76c.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
test3/51239563ac4a295857c2712133b94de88d49a243329d93f643e6b6c8cc6c0d72.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
test3/51239563ac4a295857c2712133b94de88d49a243329d93f643e6b6c8cc6c0d72.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
test3/9208908b0dc676aa1d9f2db46321bd3da597234fbc33790851032bc4d057b280.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
test3/9208908b0dc676aa1d9f2db46321bd3da597234fbc33790851032bc4d057b280.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
test3/c599af32f470f3853d837af004590fb94bd1b4a595b04dfde22f876f9a8ea851.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
test3/c599af32f470f3853d837af004590fb94bd1b4a595b04dfde22f876f9a8ea851.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
test3/d1eeb2ad38249bd944d2dc659a84f7a394652c537f80b59fceb3a2c284c6919b.exe
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
test3/d1eeb2ad38249bd944d2dc659a84f7a394652c537f80b59fceb3a2c284c6919b.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
test3/d3a43a20d2b6c497160bf63fe0dec0e1edf2e4406c9bd0ed5d00ce663fddc4cd.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
test3/d3a43a20d2b6c497160bf63fe0dec0e1edf2e4406c9bd0ed5d00ce663fddc4cd.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
test3/e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
test3/e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
test3/f7ba9ce7513a164ff2cbc3d41721d557a94e2441f22a97297f3308df6804ecd1.exe
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
test3/f7ba9ce7513a164ff2cbc3d41721d557a94e2441f22a97297f3308df6804ecd1.exe
Resource
win10v2004-20220812-en
General
-
Target
test3/08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe
-
Size
214KB
-
MD5
736acf3822d3427fd6eb4655effdb265
-
SHA1
1fb8256161d7e296a3e54fc85444f5ee970ef0e3
-
SHA256
08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c
-
SHA512
31bfc3077109f1b05e52bf11b92e5ff82f680164be36e6ead39dfe1679ac4b76003dac7d7d56435b596ce578586e737f2b46e0ff6f54d19dbda29a134b7f1bb0
-
SSDEEP
6144:EQcM8WDqVJY3laxQwNgs/YPNha3EzEZCxgKqApdLg70CTTNLvzySzVFet+H9ikLB:n8WDqVJY3laxQwNgs/YPNha3EzEZCxgn
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SiteCim.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SiteCim.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SiteCim.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SiteCim.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SiteCim.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SiteCim.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SiteCim.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3452 SiteCim.exe 3452 SiteCim.exe 3452 SiteCim.exe 3452 SiteCim.exe 3452 SiteCim.exe 3452 SiteCim.exe 3452 SiteCim.exe 3452 SiteCim.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2120 08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4700 wrote to memory of 2120 4700 08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe 79 PID 4700 wrote to memory of 2120 4700 08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe 79 PID 4700 wrote to memory of 2120 4700 08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe 79 PID 3124 wrote to memory of 3452 3124 SiteCim.exe 81 PID 3124 wrote to memory of 3452 3124 SiteCim.exe 81 PID 3124 wrote to memory of 3452 3124 SiteCim.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\test3\08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe"C:\Users\Admin\AppData\Local\Temp\test3\08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\test3\08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe"C:\Users\Admin\AppData\Local\Temp\test3\08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe"2⤵
- Suspicious behavior: RenamesItself
PID:2120
-
-
C:\Windows\SysWOW64\SiteCim.exeC:\Windows\SysWOW64\SiteCim.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\SiteCim.exe"C:\Windows\SysWOW64\SiteCim.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3452
-