Analysis
-
max time kernel
151s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/02/2023, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
cccb5e248d7e84161cb6c030aba8c00ba0e8dbb7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cccb5e248d7e84161cb6c030aba8c00ba0e8dbb7.exe
Resource
win10v2004-20221111-en
General
-
Target
cccb5e248d7e84161cb6c030aba8c00ba0e8dbb7.exe
-
Size
18KB
-
MD5
9c9c12ba5f61d078997a29057b25ddd1
-
SHA1
cccb5e248d7e84161cb6c030aba8c00ba0e8dbb7
-
SHA256
bac32c1eceed39b36e6351f7a21b115b88118cebf5c76a28c9c99be3bd9a912a
-
SHA512
c0e8d9890738503ba74b541f8721c6f71fdf10435d2b91e0e6da4c8e40b5e50747d766c77e32516ca056098a2b61f8d7ffbf8497ffeb1687aded842971dc22d9
-
SSDEEP
384:RiwgJRaMlzju0TySPPbpsdWK61I+6UuYRex41itSB1kMQig5RmPjT:RiwsRaMxRZncWt1ILvb+okB1kMQi6mPv
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1388 cccb5e248d7e84161cb6c030aba8c00ba0e8dbb7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\dndsioc = "C:\\Windows\\dndsioc.exe" cccb5e248d7e84161cb6c030aba8c00ba0e8dbb7.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\dndsioc.dll cccb5e248d7e84161cb6c030aba8c00ba0e8dbb7.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\dndsioc.exe cccb5e248d7e84161cb6c030aba8c00ba0e8dbb7.exe File opened for modification C:\Windows\dndsioc.exe cccb5e248d7e84161cb6c030aba8c00ba0e8dbb7.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1388 cccb5e248d7e84161cb6c030aba8c00ba0e8dbb7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1388 cccb5e248d7e84161cb6c030aba8c00ba0e8dbb7.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1276 1388 cccb5e248d7e84161cb6c030aba8c00ba0e8dbb7.exe 14 PID 1388 wrote to memory of 1276 1388 cccb5e248d7e84161cb6c030aba8c00ba0e8dbb7.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\cccb5e248d7e84161cb6c030aba8c00ba0e8dbb7.exe"C:\Users\Admin\AppData\Local\Temp\cccb5e248d7e84161cb6c030aba8c00ba0e8dbb7.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5df44eae4792fe14d56410646f8c715d4
SHA180a3bc30eaa5381ba18434104b33221789206425
SHA2565f04bbe4a07c1ab245e77da03e65557e9df7fb2370deb5806cdab8a8b2afbbb5
SHA5129f9443bc4008134466d9acaf3d9126016f53468f3860ea3f2104e792d9d043449121bfec3f952961c38905cd439b26faa16f50ba8bada6aba15180a923b658e8