Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
07/08/2023, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
cc3cf05869bb2d5c82c3c9ebc92853d4125dfe01199bead4efaea035a0d4d639.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
cc3cf05869bb2d5c82c3c9ebc92853d4125dfe01199bead4efaea035a0d4d639.exe
Resource
win10-20230703-en
General
-
Target
cc3cf05869bb2d5c82c3c9ebc92853d4125dfe01199bead4efaea035a0d4d639.exe
-
Size
2.5MB
-
MD5
7d7dc9605abb03a2c0b598797926d1ba
-
SHA1
6744c5a8ee9d2be8c750f2b95661d2aa9e54e26d
-
SHA256
cc3cf05869bb2d5c82c3c9ebc92853d4125dfe01199bead4efaea035a0d4d639
-
SHA512
a0ab3eff13a8671de6dd86ba60d7b12f84fd3ed94c08a4023219023f8aadc25259c38b53b0473223a500a77f43989e20c06266cd23f94a8c0e8f4133354f4720
-
SSDEEP
49152:8cbi6c/dgkp0TXw58MWzl3r8yjMCQyr3DpaJ7Vxpmd2l38z4aF:8cbK1AI8BZ7jMCQA3DpaJ7/L+
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2404 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2404 2924 cc3cf05869bb2d5c82c3c9ebc92853d4125dfe01199bead4efaea035a0d4d639.exe 28 PID 2924 wrote to memory of 2404 2924 cc3cf05869bb2d5c82c3c9ebc92853d4125dfe01199bead4efaea035a0d4d639.exe 28 PID 2924 wrote to memory of 2404 2924 cc3cf05869bb2d5c82c3c9ebc92853d4125dfe01199bead4efaea035a0d4d639.exe 28 PID 2924 wrote to memory of 2404 2924 cc3cf05869bb2d5c82c3c9ebc92853d4125dfe01199bead4efaea035a0d4d639.exe 28 PID 2924 wrote to memory of 2404 2924 cc3cf05869bb2d5c82c3c9ebc92853d4125dfe01199bead4efaea035a0d4d639.exe 28 PID 2924 wrote to memory of 2404 2924 cc3cf05869bb2d5c82c3c9ebc92853d4125dfe01199bead4efaea035a0d4d639.exe 28 PID 2924 wrote to memory of 2404 2924 cc3cf05869bb2d5c82c3c9ebc92853d4125dfe01199bead4efaea035a0d4d639.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc3cf05869bb2d5c82c3c9ebc92853d4125dfe01199bead4efaea035a0d4d639.exe"C:\Users\Admin\AppData\Local\Temp\cc3cf05869bb2d5c82c3c9ebc92853d4125dfe01199bead4efaea035a0d4d639.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /S nfHCJ.w -u2⤵
- Loads dropped DLL
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5a5732b1cb868c07c385faece285eff67
SHA16160b20d4cbb3708009598df637b6556f1df8ba6
SHA256f89acc22c624b75318f62f18ddc27a20ffb35eeb90c1f0fd176193c82c6f5718
SHA51220a67934191c53793b9a21b61cd2a5fd62bf8ba1164998e171e35e5f3fa3d69c2b885cc30cd7f716c74c39cf7dbd6195c69bbd4cdb6b798f7d92fab29c9cc346
-
Filesize
2.3MB
MD5a5732b1cb868c07c385faece285eff67
SHA16160b20d4cbb3708009598df637b6556f1df8ba6
SHA256f89acc22c624b75318f62f18ddc27a20ffb35eeb90c1f0fd176193c82c6f5718
SHA51220a67934191c53793b9a21b61cd2a5fd62bf8ba1164998e171e35e5f3fa3d69c2b885cc30cd7f716c74c39cf7dbd6195c69bbd4cdb6b798f7d92fab29c9cc346