Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 11:20
Static task
static1
Behavioral task
behavioral1
Sample
1a5ef17bc80cccbd042e62ae680aa29c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a5ef17bc80cccbd042e62ae680aa29c.exe
Resource
win10v2004-20231215-en
General
-
Target
1a5ef17bc80cccbd042e62ae680aa29c.exe
-
Size
336KB
-
MD5
1a5ef17bc80cccbd042e62ae680aa29c
-
SHA1
9f83c01ea2ed04a78b0b59c476925c25d903d47f
-
SHA256
659755abcc2eaf9b87ff2929c7c19f39bfe58aa7abe6671ee17a18244cb0dd93
-
SHA512
341a97afbcdec0feabccc327b385195390bd1af95a5bfbb6fd529becdd7ddb84e13cdbddc11678ee8afbc1acd9298a3257da7bde5deece7e841d9a1544382725
-
SSDEEP
6144:3IwfiY1dJhucMIZAy8VoSjBs46fHuLj8R6dWvLjm/:3dTJwcHZzCetOj8Rvjm/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4600 iCpkoYvX.exe -
Executes dropped EXE 2 IoCs
pid Process 1532 iCpkoYvX.exe 4600 iCpkoYvX.exe -
Loads dropped DLL 4 IoCs
pid Process 848 1a5ef17bc80cccbd042e62ae680aa29c.exe 848 1a5ef17bc80cccbd042e62ae680aa29c.exe 4600 iCpkoYvX.exe 4600 iCpkoYvX.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ytklGyjx0Who = "C:\\ProgramData\\qQBPCYFAOcwmB\\iCpkoYvX.exe" 1a5ef17bc80cccbd042e62ae680aa29c.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4920 set thread context of 848 4920 1a5ef17bc80cccbd042e62ae680aa29c.exe 92 PID 1532 set thread context of 4600 1532 iCpkoYvX.exe 94 PID 4600 set thread context of 3220 4600 iCpkoYvX.exe 95 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4920 wrote to memory of 848 4920 1a5ef17bc80cccbd042e62ae680aa29c.exe 92 PID 4920 wrote to memory of 848 4920 1a5ef17bc80cccbd042e62ae680aa29c.exe 92 PID 4920 wrote to memory of 848 4920 1a5ef17bc80cccbd042e62ae680aa29c.exe 92 PID 4920 wrote to memory of 848 4920 1a5ef17bc80cccbd042e62ae680aa29c.exe 92 PID 4920 wrote to memory of 848 4920 1a5ef17bc80cccbd042e62ae680aa29c.exe 92 PID 848 wrote to memory of 1532 848 1a5ef17bc80cccbd042e62ae680aa29c.exe 93 PID 848 wrote to memory of 1532 848 1a5ef17bc80cccbd042e62ae680aa29c.exe 93 PID 848 wrote to memory of 1532 848 1a5ef17bc80cccbd042e62ae680aa29c.exe 93 PID 1532 wrote to memory of 4600 1532 iCpkoYvX.exe 94 PID 1532 wrote to memory of 4600 1532 iCpkoYvX.exe 94 PID 1532 wrote to memory of 4600 1532 iCpkoYvX.exe 94 PID 1532 wrote to memory of 4600 1532 iCpkoYvX.exe 94 PID 1532 wrote to memory of 4600 1532 iCpkoYvX.exe 94 PID 4600 wrote to memory of 3220 4600 iCpkoYvX.exe 95 PID 4600 wrote to memory of 3220 4600 iCpkoYvX.exe 95 PID 4600 wrote to memory of 3220 4600 iCpkoYvX.exe 95 PID 4600 wrote to memory of 3220 4600 iCpkoYvX.exe 95 PID 4600 wrote to memory of 3220 4600 iCpkoYvX.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a5ef17bc80cccbd042e62ae680aa29c.exe"C:\Users\Admin\AppData\Local\Temp\1a5ef17bc80cccbd042e62ae680aa29c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\1a5ef17bc80cccbd042e62ae680aa29c.exe"C:\Users\Admin\AppData\Local\Temp\1a5ef17bc80cccbd042e62ae680aa29c.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:848 -
C:\ProgramData\qQBPCYFAOcwmB\iCpkoYvX.exe"C:\ProgramData\qQBPCYFAOcwmB\iCpkoYvX.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\ProgramData\qQBPCYFAOcwmB\iCpkoYvX.exe"C:\ProgramData\qQBPCYFAOcwmB\iCpkoYvX.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /i:46005⤵PID:3220
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5345de0637c018c3366ad2039dcdf6ed9
SHA18e1922ed5836b6bfeccf468c5705c2aeb72cb6d8
SHA256721d769e91a1e38857c5f98b492dc63d907540c3c775daf5800cf229ee80e87c
SHA512dc9ba0a47f738a08a504127a8c0d33d9251a9782bf127ee87b61a3c27408ead21f02e6fbebbb2aa72cd84e48d3c8931990d938b574ceb5117416ce2773aa02e3
-
Filesize
92KB
MD548f28a5a324e2bf9b49448ff30e1e894
SHA10a48f96c4214b9b098bd5b5fbeb6a7e8542f4a74
SHA2568e149d6eb3874d1a8a726ede90007ee09441b1db6d7abc1a3746f19cab3ba6ee
SHA5125bab01b6d7cefded61d27f53d2a5fbea665752fe6ac60965866f7aaa71c32c3a2a35d62fd27e87b89517eba69ae6bf14269db5c70847b82de1bf72c1d7de6023