Analysis
-
max time kernel
292s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
20-07-2023 03:38
Static task
static1
Behavioral task
behavioral1
Sample
8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe
Resource
win10-20230703-en
General
-
Target
8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe
-
Size
4.8MB
-
MD5
0b4e2d65448cb900ec1d64ea564de052
-
SHA1
d1348e11bf46327def51ff5c892894f9cb66e501
-
SHA256
8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92
-
SHA512
ead754d3337b40f7fd2d5820e888112d37824523b2000f847ef805ae9fc1a519c11fbd7f8c5a108b6275479d78ac21ae7a517a79456e0f9ce9b22713deda5d46
-
SSDEEP
12288:TeC3CZ/dn53l3lYZDGR2vK/BY3nLkpVpnG6kzD:i+m33l3lYZE2C/zG5
Malware Config
Extracted
systembc
91.103.252.89:4317
91.103.252.57:4317
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
cwtiwn.exepid process 3012 cwtiwn.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000\Software\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe'\"" 8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe Key created \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000\Software\Microsoft\Windows\CurrentVersion\Run 8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe -
Drops file in Windows directory 1 IoCs
Processes:
8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exedescription ioc process File created C:\Windows\Tasks\odcogxqjcunfwphaskd.job 8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe"C:\Users\Admin\AppData\Local\Temp\8b399f768287de13f64a468c4b57e19f5867d29b9e8906d070844b430166ea92.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
PID:4448
-
C:\Users\Admin\AppData\Local\Temp\cwtiwn.exeC:\Users\Admin\AppData\Local\Temp\cwtiwn.exe1⤵
- Executes dropped EXE
PID:3012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD5e2ec8ec54563605f55250a2240333a0d
SHA120b25702b9a699cf0ed75d5c1e1c81da5ba641bf
SHA25648329b1fbc1d5c5ff5ecb32c7bc3cb74cc68c28a8b65703687d8cd729140f963
SHA5127a9ceb9c69d621b8341d04e8963119ac80f266d5f86b438404ae9ba1b20267524f15fcb79fea285b1505d9d5cb7bb291cba28942a4d7e98076830ce13ff48228
-
Filesize
4.8MB
MD5e2ec8ec54563605f55250a2240333a0d
SHA120b25702b9a699cf0ed75d5c1e1c81da5ba641bf
SHA25648329b1fbc1d5c5ff5ecb32c7bc3cb74cc68c28a8b65703687d8cd729140f963
SHA5127a9ceb9c69d621b8341d04e8963119ac80f266d5f86b438404ae9ba1b20267524f15fcb79fea285b1505d9d5cb7bb291cba28942a4d7e98076830ce13ff48228