Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2023, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
fbc4371a517670d9e0f3df4b423f1128c98538ab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fbc4371a517670d9e0f3df4b423f1128c98538ab.exe
Resource
win10v2004-20220812-en
General
-
Target
fbc4371a517670d9e0f3df4b423f1128c98538ab.exe
-
Size
829KB
-
MD5
9db0cb8ce863c77576b7fe8a65c4c200
-
SHA1
fbc4371a517670d9e0f3df4b423f1128c98538ab
-
SHA256
1716487b103dc267d5d1d0ad0f83565c11e3a18b0fd840f7b16893a14716b299
-
SHA512
99e72029cc0ead9587a009d79fde561ca651db2380265d06fbb5408e01d07939a11b812e81f2360e5593f12ba4fa499ee85ce7106a58001c679f6a4a9b931fe3
-
SSDEEP
12288:2Y7mobjGBDlFYlWxHE1DtDjZ6mmjgn9LmszAipCEKW/DiaC:2Y7HjGRlFYM9EttDjgPgnUHWLi3
Malware Config
Extracted
darkcloud
- email_from
- email_to
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1416 caodqz.exe 4888 caodqz.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lojtsiioase = "C:\\Users\\Admin\\AppData\\Roaming\\ggkgnfxwhhhj\\eagmgneumqoupf.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\caodqz.exe\" C:\\Users\\Admin\\AppDa" caodqz.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1416 set thread context of 4888 1416 caodqz.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4888 caodqz.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1416 caodqz.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4888 caodqz.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4852 wrote to memory of 1416 4852 fbc4371a517670d9e0f3df4b423f1128c98538ab.exe 81 PID 4852 wrote to memory of 1416 4852 fbc4371a517670d9e0f3df4b423f1128c98538ab.exe 81 PID 4852 wrote to memory of 1416 4852 fbc4371a517670d9e0f3df4b423f1128c98538ab.exe 81 PID 1416 wrote to memory of 4888 1416 caodqz.exe 83 PID 1416 wrote to memory of 4888 1416 caodqz.exe 83 PID 1416 wrote to memory of 4888 1416 caodqz.exe 83 PID 1416 wrote to memory of 4888 1416 caodqz.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbc4371a517670d9e0f3df4b423f1128c98538ab.exe"C:\Users\Admin\AppData\Local\Temp\fbc4371a517670d9e0f3df4b423f1128c98538ab.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\caodqz.exe"C:\Users\Admin\AppData\Local\Temp\caodqz.exe" C:\Users\Admin\AppData\Local\Temp\xjhmmycw.i2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\caodqz.exe"C:\Users\Admin\AppData\Local\Temp\caodqz.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4888
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5f5524dc27933fc7851b6140bb484f76c
SHA139fe27bc77923cb7418cca5c2cabce331c9c9810
SHA2561ee1aeda78194d6ecf791520c6e70259b985cfea2b1033e26cd0f293c08602a5
SHA512cb36013b87677585c5114e914345edfef381522768d589039d577c15216519106998641709fa1e603c68160a7b263d6cf2f4c3d1d509ad1de5a375674e791d33
-
Filesize
86KB
MD5f5524dc27933fc7851b6140bb484f76c
SHA139fe27bc77923cb7418cca5c2cabce331c9c9810
SHA2561ee1aeda78194d6ecf791520c6e70259b985cfea2b1033e26cd0f293c08602a5
SHA512cb36013b87677585c5114e914345edfef381522768d589039d577c15216519106998641709fa1e603c68160a7b263d6cf2f4c3d1d509ad1de5a375674e791d33
-
Filesize
86KB
MD5f5524dc27933fc7851b6140bb484f76c
SHA139fe27bc77923cb7418cca5c2cabce331c9c9810
SHA2561ee1aeda78194d6ecf791520c6e70259b985cfea2b1033e26cd0f293c08602a5
SHA512cb36013b87677585c5114e914345edfef381522768d589039d577c15216519106998641709fa1e603c68160a7b263d6cf2f4c3d1d509ad1de5a375674e791d33
-
Filesize
488KB
MD59cedbcfa66f05ca2e155e22af80bfa50
SHA1eda9666829cf1013d52b8f7bd2b50ff01444a0c8
SHA2562b52049dc8626d3d01af7c8ef035d6d19087a0b604e29a942e240a1b9814f8cf
SHA512fad796e1b55b49ac13d1e0184f9b56f3a59f0e7455dade8b63d66f9f09690f1d6935bedd40fdeafa91314f42dadfc2123d7a74e37fb2a203552e95d1d5ada821
-
Filesize
7KB
MD54fbdf41a057b278be5fe9dadadbf8e57
SHA1ec99ef641f1e077772b7260b27daeceb77a12d40
SHA25695fd2f0048b1c37af5a6b429b651646e17070bdcb563b638a6bfb442b8485e55
SHA5125de96b3b49e769818a566dbeb12ec0612b7e4e2b305e6ad9b3317d934588a15b20d0c2cd5df78c280a20fadad2a0230037cb62bfa3817a23970e8b237b037854