Analysis
-
max time kernel
53s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-03-2023 13:32
Static task
static1
Behavioral task
behavioral1
Sample
ccsetup610_pro_trial.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ccsetup610_pro_trial.exe
Resource
win10v2004-20230220-en
General
-
Target
ccsetup610_pro_trial.exe
-
Size
51.4MB
-
MD5
0be70789c0ee6ba913a65637b7050705
-
SHA1
fbc7371e9bd416b1a5f0e6eb68a86d538e341fb0
-
SHA256
9bc9bf7786f77e2ed0499c124e517c9fb8681cf4370c4504a8403e0f43fed8e2
-
SHA512
1fb145ae42d75dede203bdf566ef25ddfede5a075d6e30b7a6bf925c01ac0504faeb771a9059df6fa42c68d701f21e5de0a3ba49146e94077a0a98c61d9a52ca
-
SSDEEP
1572864:fXa3QR9TUKGAqcudtTkpttagIc56qFVKtdgZk:fq3QR9dRqv3TyEEnCdgZk
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
Processes:
ccsetup610_pro_trial.exepid process 1232 ccsetup610_pro_trial.exe 1232 ccsetup610_pro_trial.exe 1232 ccsetup610_pro_trial.exe 1232 ccsetup610_pro_trial.exe 1232 ccsetup610_pro_trial.exe 1232 ccsetup610_pro_trial.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
ccsetup610_pro_trial.exedescription ioc process File opened for modification \??\PhysicalDrive0 ccsetup610_pro_trial.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ccsetup610_pro_trial.exedescription pid process Token: SeManageVolumePrivilege 1232 ccsetup610_pro_trial.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ccsetup610_pro_trial.exepid process 1232 ccsetup610_pro_trial.exe 1232 ccsetup610_pro_trial.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.logFilesize
512KB
MD5ada465dac518c02652dd6a0ee330587d
SHA14d69e66c887e82fffb00a0659967e7b50a4fda1b
SHA25688ceb8b5da871c1babbb7baf789c8baa4faab73e4a63d11a8a4bcfff6e467eb7
SHA512d67e23eb46fd0811a8916b0cdc86e48ee814adeb2e5769f17ba7c9e0f503cede6949d193fb78c588f85e2e48f943f91b4aedd6ccb1857066ebe5f63469dfa21e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.datFilesize
32.1MB
MD5ef6d62ade32fcce2da5fb20c1f2df70d
SHA14f48cd3ce7ecb97df1c9530a3080fb97f09f74eb
SHA256bd782475905694a4391ca0f0bfcf2a6748f504fa6a8dbf3c84b4601f371d4b1d
SHA5121c3afe14d5dd13e27aa3c818acdcb06fb1a1ae8976e7a1a3e2067ff5287beec8c6806fb4f1bfae13e5029cbc608c7fa6fb1a4427ba4aae7a50429b11dd45908a
-
C:\Users\Admin\AppData\Local\Temp\nsy234C.tmp\nsDialogs.dllFilesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
C:\Users\Admin\AppData\Local\Temp\nsy234C.tmp\p\pfBL.dllFilesize
11.3MB
MD5f8d1c110600144a9310723c011eeb9c8
SHA1304e211607eb14e079956531e149e53db2930762
SHA256d2b8a9d801e5c823be4c8eb9d721a8181d12f3b435d9c80b858d5e6074530bd2
SHA5127656c865420724b8a77c5a4180b6a410c4c54e9f71f5938fb2d3549bfbd0b05e10f0deb90e532b9b0699e480133c410074ed58ae8f2f1dcd547af725e802eac5
-
C:\Users\Admin\AppData\Local\Temp\nsy234C.tmp\ui\pfUI.dllFilesize
16.4MB
MD5d0ee52daa39b8b22eced053f68d5b765
SHA124675ba34154b43ab97fe27c9a15e8ed50d101b6
SHA2563b71b214236e0fe464261e081628fb7d26fded5a08cca28820cf0a849310cd3f
SHA512756f1628b40459e191cc96ffd75118cf8e7726764ca497504a0fa4a22a150347d1bfb993dd4c308f420fc57171eaac9ecba7b9761cb96929ba5f098ce56d76d5
-
C:\Users\Admin\AppData\Local\Temp\nsy234C.tmp\ui\res\CC_Logo_40x96.pngFilesize
2KB
MD5d32b0460183056d3056d6db89c992b88
SHA179823e151b3438ab8d273a6b4a3d56a9571379b4
SHA256b013039e32d2f8e54cfebdbfdabc25f21aa0bbe9ef26a2a5319a20024961e9a7
SHA5123ad36f9d4015f2d3d5bc15eac221a0ecef3fcb1ef4c3c87b97b3413a66faa445869e054f7252cc233cd2bf8f1aa75cb3351d2c70c8121f4850b3db29951bc817
-
C:\Users\Admin\AppData\Local\Temp\nsy234C.tmp\ui\res\CC_logo_72x66.pngFilesize
7KB
MD5a736159759a56c29575e49cb2a51f2b3
SHA1b1594bbca4358886d25c3a1bc662d87c913318cb
SHA25658e75de1789c90333daaf93176194d2a3d64f2eecdf57a4b9384a229e81f874f
SHA5124da523a36375b37fa7bc4b4ccf7c93e1df7b2da15152edf7d419927aa1bb271ef8ba27fe734d2f623fcc02b47319e75333df014bed01eb466e0cd9ec4111ef53
-
C:\Users\Admin\AppData\Local\Temp\nsy234C.tmp\ui\res\PF_computer.pngFilesize
87KB
MD57f4f45c9393a0664d9d0725a2ff42c6b
SHA1b7b30eb534e6dc69e8e293443c157134569e8ce7
SHA256dbd8b6fdb66604a0a5e8efe269fbfa598e4a94dc146006036409d905209da42b
SHA5120c27f9ce615cbff3e17fd772ce3929ab4419d7432d96223b7eec1ba70953f2ac993404b954020247b52d7f7499212d44eb6f85da2e2676773cafe1ce89b390f9
-
\Users\Admin\AppData\Local\Temp\nsy234C.tmp\System.dllFilesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
\Users\Admin\AppData\Local\Temp\nsy234C.tmp\UserInfo.dllFilesize
4KB
MD52f69afa9d17a5245ec9b5bb03d56f63c
SHA1e0a133222136b3d4783e965513a690c23826aec9
SHA256e54989d2b83e7282d0bec56b098635146aab5d5a283f1f89486816851ef885a0
SHA512bfd4af50e41ebc56e30355c722c2a55540a5bbddb68f1522ef7aabfe4f5f2a20e87fa9677ee3cdb3c0bf5bd3988b89d1224d32c9f23342a16e46c542d8dc0926
-
\Users\Admin\AppData\Local\Temp\nsy234C.tmp\nsDialogs.dllFilesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
\Users\Admin\AppData\Local\Temp\nsy234C.tmp\nsDialogs.dllFilesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
\Users\Admin\AppData\Local\Temp\nsy234C.tmp\p\pfBL.dllFilesize
11.3MB
MD5f8d1c110600144a9310723c011eeb9c8
SHA1304e211607eb14e079956531e149e53db2930762
SHA256d2b8a9d801e5c823be4c8eb9d721a8181d12f3b435d9c80b858d5e6074530bd2
SHA5127656c865420724b8a77c5a4180b6a410c4c54e9f71f5938fb2d3549bfbd0b05e10f0deb90e532b9b0699e480133c410074ed58ae8f2f1dcd547af725e802eac5
-
\Users\Admin\AppData\Local\Temp\nsy234C.tmp\ui\pfUI.dllFilesize
16.4MB
MD5d0ee52daa39b8b22eced053f68d5b765
SHA124675ba34154b43ab97fe27c9a15e8ed50d101b6
SHA2563b71b214236e0fe464261e081628fb7d26fded5a08cca28820cf0a849310cd3f
SHA512756f1628b40459e191cc96ffd75118cf8e7726764ca497504a0fa4a22a150347d1bfb993dd4c308f420fc57171eaac9ecba7b9761cb96929ba5f098ce56d76d5
-
memory/1232-166-0x00000000048E0000-0x00000000048F0000-memory.dmpFilesize
64KB
-
memory/1232-172-0x0000000004A80000-0x0000000004A90000-memory.dmpFilesize
64KB
-
memory/1232-195-0x00000000070B0000-0x00000000070B8000-memory.dmpFilesize
32KB
-
memory/1232-198-0x0000000007230000-0x0000000007238000-memory.dmpFilesize
32KB
-
memory/1232-200-0x00000000070A0000-0x00000000070A1000-memory.dmpFilesize
4KB
-
memory/1232-205-0x0000000007050000-0x0000000007051000-memory.dmpFilesize
4KB
-
memory/1232-165-0x0000000003C70000-0x0000000003C71000-memory.dmpFilesize
4KB