Overview
overview
7Static
static
4update_06_09_2023.zip
windows7-x64
1update_06_09_2023.zip
windows10-2004-x64
1ccat.scc
windows7-x64
3ccat.scc
windows10-2004-x64
3courses/O_...23.ecp
windows7-x64
3courses/O_...23.ecp
windows10-2004-x64
3courses/P_...23.ecp
windows7-x64
3courses/P_...23.ecp
windows10-2004-x64
3ealist.xml
windows7-x64
1ealist.xml
windows10-2004-x64
1olimp_ente...30.exe
windows7-x64
7olimp_ente...30.exe
windows10-2004-x64
7olimpoks_e...S).pdf
windows7-x64
1olimpoks_e...S).pdf
windows10-2004-x64
1olimpoks_e....9.pdf
windows7-x64
1olimpoks_e....9.pdf
windows10-2004-x64
1plist.xml
windows7-x64
1plist.xml
windows10-2004-x64
1Analysis
-
max time kernel
417s -
max time network
458s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 09:30
Behavioral task
behavioral1
Sample
update_06_09_2023.zip
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
update_06_09_2023.zip
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
ccat.scc
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
ccat.scc
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
courses/O_T_1884.2_06.09.2023.ecp
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
courses/O_T_1884.2_06.09.2023.ecp
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
courses/P_B_P_115.22_06.09.2023.ecp
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
courses/P_B_P_115.22_06.09.2023.ecp
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
ealist.xml
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
ealist.xml
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
olimp_enterprise_update_5.3.9.11930.exe
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
olimp_enterprise_update_5.3.9.11930.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
olimpoks_enterprise_5_x_x_install_update (WINDOWS).pdf
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
olimpoks_enterprise_5_x_x_install_update (WINDOWS).pdf
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
olimpoks_enterprise_rukovodstvo_5.3.9.pdf
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
olimpoks_enterprise_rukovodstvo_5.3.9.pdf
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
plist.xml
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
plist.xml
Resource
win10v2004-20230915-en
General
-
Target
ccat.scc
-
Size
54KB
-
MD5
04edb736c6d36b3579a3ad88eef3caff
-
SHA1
8c5e9c2c9a75fc886e114974f44c658ae0c211ed
-
SHA256
b122f4db247e9ec20e9d19d403dfd2c4b37f8b738196551730919830ec6255ea
-
SHA512
df4abc8aeb049254fc9cd891d55ff81c864ba738e853807dc6e55a8741ad9686d08d0e5ffe1eb5a42c837d51e831a1ab9baee190e3393567db1feade3bee6201
-
SSDEEP
1536:rhAAcE7ZzWbFdB/xp+vCzYySbKsFaFUVb8Tj76x03PM9zapAj89cJFI78ButEmEs:NAAcE7ZzWbFdB/xp+vCzYySbKsFaFUVo
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\.scc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\.scc\ = "scc_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\scc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\scc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\scc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\scc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\scc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\scc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1440 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1440 AcroRd32.exe 1440 AcroRd32.exe 1440 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2872 2544 cmd.exe 27 PID 2544 wrote to memory of 2872 2544 cmd.exe 27 PID 2544 wrote to memory of 2872 2544 cmd.exe 27 PID 2872 wrote to memory of 1440 2872 rundll32.exe 28 PID 2872 wrote to memory of 1440 2872 rundll32.exe 28 PID 2872 wrote to memory of 1440 2872 rundll32.exe 28 PID 2872 wrote to memory of 1440 2872 rundll32.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ccat.scc1⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ccat.scc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ccat.scc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1440
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bbce7bf5ee5b2e1dc697f59618652825
SHA1d617b079b6740733f057b75bcad12f61e675f8d1
SHA256ba1c867742b381e1ef21d1dba0759e6e8228cc6cf4a774c40ba529f4398028f4
SHA512171a595832daa1e282d277fb93c85f08ab53a24453e4181dc7bd39f6ef6eb26a80e0b07e7e26256c0760397c2406ea9c53e8e08828710de1b64c1ebc82b3b8c2