Analysis
-
max time kernel
28s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30-03-2023 07:16
Static task
static1
Behavioral task
behavioral1
Sample
02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe
Resource
win10v2004-20230220-en
General
-
Target
02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe
-
Size
1.0MB
-
MD5
7a1548f032ca02cef60e117a7387258e
-
SHA1
5950d7a695916b163f2ff55206fa2df1b0f7942c
-
SHA256
02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f
-
SHA512
aa729f641367de19703e4be6080b8656b7360522ba905ac121010b37021844fe01ffcd703cb0a29c040d6303848f59c8eb0ca67550f6c616cb366b8fcb22d8e4
-
SSDEEP
24576:l0a8pWc7x4TyjheHod9XxeDNmRJLduNtjKaDaxSEFJ6:l7cGujPeDN4pu/2XxSEFo
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Loads dropped DLL 5 IoCs
pid Process 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CCB_HDZB_2G_P11.dll 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe File created C:\Windows\system32\CCB_HDZB_2G_P11.dll 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\CCBComponents\Plugins\CARoot\Cert_HDZB_2G_Firefox.exe 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe File opened for modification C:\Program Files (x86)\CCBComponents\HDZB\log\20230330.log 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe File created C:\Program Files (x86)\CCBComponents\Plugins\npHDZB2gCertCtrl.dll 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe File created C:\Program Files (x86)\CCBComponents\Plugins\npHDZB2gSNCtrl.dll 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1208 sc.exe 1724 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1372 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe 28 PID 2016 wrote to memory of 1372 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe 28 PID 2016 wrote to memory of 1372 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe 28 PID 2016 wrote to memory of 1372 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe 28 PID 1372 wrote to memory of 1208 1372 cmd.exe 30 PID 1372 wrote to memory of 1208 1372 cmd.exe 30 PID 1372 wrote to memory of 1208 1372 cmd.exe 30 PID 1372 wrote to memory of 1208 1372 cmd.exe 30 PID 2016 wrote to memory of 1452 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe 31 PID 2016 wrote to memory of 1452 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe 31 PID 2016 wrote to memory of 1452 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe 31 PID 2016 wrote to memory of 1452 2016 02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe 31 PID 1452 wrote to memory of 1724 1452 cmd.exe 33 PID 1452 wrote to memory of 1724 1452 cmd.exe 33 PID 1452 wrote to memory of 1724 1452 cmd.exe 33 PID 1452 wrote to memory of 1724 1452 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe"C:\Users\Admin\AppData\Local\Temp\02b3b2ed3849f28c02c9b434897e7fded907413a20c773bcd173d7ce83ee025f.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.execmd /C C:\Windows\system32\sc.exe STOP "HDZB_DeviceService_For_CCB_2G"2⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe STOP "HDZB_DeviceService_For_CCB_2G"3⤵
- Launches sc.exe
PID:1208
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C C:\Windows\system32\sc.exe delete "HDZB_DeviceService_For_CCB_2G"2⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe delete "HDZB_DeviceService_For_CCB_2G"3⤵
- Launches sc.exe
PID:1724
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5ec95edf0ce02afd9511b14ad87bd9844
SHA183b99d5652df23f4ed42603604f9f8108eec4072
SHA256062bb420e8a0b7d8fd34dfc345148c925681ad483d137884f4fdffb1d394ff01
SHA512dc1e0e6e45342232b513d53cde4fcc8845dd55e216430bca7e76bb7eacbc0a06c90ddf7b4f250afc7fbf750c9ea3241ff0bbd8c36d9521a76348288e96b829b5
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
6KB
MD508e9796ca20c5fc5076e3ac05fb5709a
SHA107971d52dcbaa1054060073571ced046347177f7
SHA2568165c7aef7de3d3e0549776535bedc380ad9be7bb85e60ad6436f71528d092af
SHA51202618317d6ab0302324aae4d3c5fca56b21e68c899e211cfa9412cf73820a1f931e56753c904fd7e510c638b4463aedbfe9536790279e096ea0387b67013e0c4
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
41KB
MD5ec95edf0ce02afd9511b14ad87bd9844
SHA183b99d5652df23f4ed42603604f9f8108eec4072
SHA256062bb420e8a0b7d8fd34dfc345148c925681ad483d137884f4fdffb1d394ff01
SHA512dc1e0e6e45342232b513d53cde4fcc8845dd55e216430bca7e76bb7eacbc0a06c90ddf7b4f250afc7fbf750c9ea3241ff0bbd8c36d9521a76348288e96b829b5
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
6KB
MD508e9796ca20c5fc5076e3ac05fb5709a
SHA107971d52dcbaa1054060073571ced046347177f7
SHA2568165c7aef7de3d3e0549776535bedc380ad9be7bb85e60ad6436f71528d092af
SHA51202618317d6ab0302324aae4d3c5fca56b21e68c899e211cfa9412cf73820a1f931e56753c904fd7e510c638b4463aedbfe9536790279e096ea0387b67013e0c4
-
Filesize
6KB
MD508e9796ca20c5fc5076e3ac05fb5709a
SHA107971d52dcbaa1054060073571ced046347177f7
SHA2568165c7aef7de3d3e0549776535bedc380ad9be7bb85e60ad6436f71528d092af
SHA51202618317d6ab0302324aae4d3c5fca56b21e68c899e211cfa9412cf73820a1f931e56753c904fd7e510c638b4463aedbfe9536790279e096ea0387b67013e0c4
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7