Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 19:19
Static task
static1
Behavioral task
behavioral1
Sample
0ceee040978ed4d85b39c73173f431f4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ceee040978ed4d85b39c73173f431f4.exe
Resource
win10v2004-20231215-en
General
-
Target
0ceee040978ed4d85b39c73173f431f4.exe
-
Size
744KB
-
MD5
0ceee040978ed4d85b39c73173f431f4
-
SHA1
3b08b579755e143cf5effd74da0041fb0b401158
-
SHA256
7b6270216dff19b969b6ab9c92d8ff7c14c712c67af2523e1f231d0e72762653
-
SHA512
733d8d7e53241ae20db96fa102240ae0a8a0d658c1f12056513b5b75341c509de250a31ebf31350d7003d354e7d0e14c4b58cda89528fb82c270872ddc58c367
-
SSDEEP
12288:uaHc64b888888888888W888888888889jscV7TdjL47zdU5imqsX3sv33rD+zG/7:F86IIW7uvmQBsHUezG/aYFkJR30F6rpW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1672 0ceee040978ed4d85b39c73173f431f4.tmp -
Loads dropped DLL 1 IoCs
pid Process 1960 0ceee040978ed4d85b39c73173f431f4.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1672 0ceee040978ed4d85b39c73173f431f4.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1672 1960 0ceee040978ed4d85b39c73173f431f4.exe 14 PID 1960 wrote to memory of 1672 1960 0ceee040978ed4d85b39c73173f431f4.exe 14 PID 1960 wrote to memory of 1672 1960 0ceee040978ed4d85b39c73173f431f4.exe 14 PID 1960 wrote to memory of 1672 1960 0ceee040978ed4d85b39c73173f431f4.exe 14 PID 1960 wrote to memory of 1672 1960 0ceee040978ed4d85b39c73173f431f4.exe 14 PID 1960 wrote to memory of 1672 1960 0ceee040978ed4d85b39c73173f431f4.exe 14 PID 1960 wrote to memory of 1672 1960 0ceee040978ed4d85b39c73173f431f4.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\is-0NID1.tmp\0ceee040978ed4d85b39c73173f431f4.tmp"C:\Users\Admin\AppData\Local\Temp\is-0NID1.tmp\0ceee040978ed4d85b39c73173f431f4.tmp" /SL5="$4010A,371795,121344,C:\Users\Admin\AppData\Local\Temp\0ceee040978ed4d85b39c73173f431f4.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1672
-
C:\Users\Admin\AppData\Local\Temp\0ceee040978ed4d85b39c73173f431f4.exe"C:\Users\Admin\AppData\Local\Temp\0ceee040978ed4d85b39c73173f431f4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1960
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158KB
MD5b20fbfa2c1a970e11e9c166f66eadce0
SHA1eec46e91d3ea6c054ad02301023159a3a9eb86d2
SHA2560b684f443c3f36f9d2690620c4cf8896f2f7969aed90a09d22063edd20cb3a7e
SHA5120364f51f276387d580dcb1876246e3caa840e4af691881c4e8ee8fda3d97b343dccb3d46afde5370fb2c7a8432c11ea563fa9b91bd6ee792301bec081605a490
-
Filesize
49KB
MD544d3e3b2b83b94db675308efa0dd543c
SHA12625d9eae0c3da01b572bd8790eea239de2f273e
SHA25649f926439c7b121530b0c17010c8229280f612611ae93449e465b807d876f5a2
SHA512142905810d69410eb5ea1f00f3253f6c2e30519974290b86d0e5e56921667c415a2cd6fb24102c8f27bfd19b3b24551c668377af1ff8cca3ffce51671dec2c8e