Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 03:16
Static task
static1
Behavioral task
behavioral1
Sample
025e7a9619f052a0a939f5401eb9bba9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
025e7a9619f052a0a939f5401eb9bba9.exe
Resource
win10v2004-20231215-en
General
-
Target
025e7a9619f052a0a939f5401eb9bba9.exe
-
Size
1.9MB
-
MD5
025e7a9619f052a0a939f5401eb9bba9
-
SHA1
a351fb1d3ce9b2d8c1c3c65c74c9f8be54fbaf67
-
SHA256
bd2308033e151f6a0806dfb25be89756f7d480057ec91112b4022a9d0259b7bc
-
SHA512
c2f83e5f5f0b9856f57c5d1e7097e1b965c0dc676666cf2e10c524727b7d672f1016fc7f12b3e8ac78c423862d04b3dcd79881bf96f5b004e628333c64553feb
-
SSDEEP
49152:DfFVaZ8LXYPGjw3ZUp+1URlA54qgrKBmnOirKmwaOIr:DfbaKcGcqpPRle3GTrKm1
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\CCntr\\ccmain.exe" 025e7a9619f052a0a939f5401eb9bba9.exe -
Executes dropped EXE 1 IoCs
pid Process 4032 ccagent.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ccagent.exe = "C:\\Users\\Admin\\AppData\\Roaming\\CCntr\\ccagent.exe" 025e7a9619f052a0a939f5401eb9bba9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4032 ccagent.exe 4032 ccagent.exe 4032 ccagent.exe 4032 ccagent.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 4032 ccagent.exe 4032 ccagent.exe 4032 ccagent.exe 4032 ccagent.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4956 wrote to memory of 4032 4956 025e7a9619f052a0a939f5401eb9bba9.exe 92 PID 4956 wrote to memory of 4032 4956 025e7a9619f052a0a939f5401eb9bba9.exe 92 PID 4956 wrote to memory of 4032 4956 025e7a9619f052a0a939f5401eb9bba9.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\025e7a9619f052a0a939f5401eb9bba9.exe"C:\Users\Admin\AppData\Local\Temp\025e7a9619f052a0a939f5401eb9bba9.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Roaming\CCntr\ccagent.exeC:\Users\Admin\AppData\Roaming\CCntr\ccagent.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD593f12f35388be14412fc4b929f1640c1
SHA1159054116dd01d60168925bbc520abe301bedc9b
SHA256cb855bdf3d5c206ffc071b49766404663fc4a5221dafcd285eaa5bd6d4bb021f
SHA5120b077793cdc427ae2e7dc18d8cc462de11143974a2f43877b1e7e2fef48d4c985e397f124f229469b2ac7f645d5a637ac564064ee829f987f9bb3841181e713f
-
Filesize
97KB
MD52b8386c65c2706139c4accbe7440afc7
SHA1e011bf0f39beeec8d94bbfbfb0df7a4534087750
SHA25657cbb50f80707b6f1c78d746bdd4a53bca7907120f4f5f35ed5b07985c328826
SHA512254b510e36ba83b69c2614279c52b437495d13ad49c6d7ecf155136f29487ab0c5bb963c6516f1878205e0734883107bb185ceb2f78a6bebf2b513f3a4c4ed4b
-
Filesize
180B
MD5f64b91e9d33ec957d9ba096f2201e764
SHA1d7bec948194ff26db71e8081369ad5ac825d01b4
SHA2563ea958c1d4f38b0b17eb725fc01446ba99b8955df001fecb82fd50fb32756537
SHA5128a9324ab0896282c0044dc915edf7b9cd55aaa4a5224e3118f2f5a58bddb4212576413477f7076646855b3be1d9588e9e4a3af146acad5747110eb06df374eac