Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 19:35
Static task
static1
Behavioral task
behavioral1
Sample
01e93179d45a85ae8e88eb0dc78e90cf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01e93179d45a85ae8e88eb0dc78e90cf.exe
Resource
win10v2004-20231222-en
General
-
Target
01e93179d45a85ae8e88eb0dc78e90cf.exe
-
Size
114KB
-
MD5
01e93179d45a85ae8e88eb0dc78e90cf
-
SHA1
8c7207b5fbabe284ba0e080f1d73061a4ce0c294
-
SHA256
b072d29bae0d53dfd1a70bc48cacc559535020d6e2b2039f8acdd53fe22053b9
-
SHA512
0658da2ee6965e992542312a7b80a486403659dc0a42b4efa9b8239aa4ef69eec16c072ec08db50fa01dcecbee6953ef0fda056c998df349d29652dcf336cfff
-
SSDEEP
3072:TtcIf1MhEYUla/VKZqDPJ9ZtpJgptHVMCd:JcISEq0qLRJg3Vdd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Hgocoj.exepid process 2304 Hgocoj.exe -
Loads dropped DLL 2 IoCs
Processes:
01e93179d45a85ae8e88eb0dc78e90cf.exepid process 2860 01e93179d45a85ae8e88eb0dc78e90cf.exe 2860 01e93179d45a85ae8e88eb0dc78e90cf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
01e93179d45a85ae8e88eb0dc78e90cf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\Hgocoj = "C:\\Users\\Admin\\AppData\\Roaming\\Hgocoj.exe" 01e93179d45a85ae8e88eb0dc78e90cf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
01e93179d45a85ae8e88eb0dc78e90cf.exedescription pid process target process PID 2096 set thread context of 2860 2096 01e93179d45a85ae8e88eb0dc78e90cf.exe 01e93179d45a85ae8e88eb0dc78e90cf.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
01e93179d45a85ae8e88eb0dc78e90cf.exepid process 2860 01e93179d45a85ae8e88eb0dc78e90cf.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
01e93179d45a85ae8e88eb0dc78e90cf.exe01e93179d45a85ae8e88eb0dc78e90cf.exedescription pid process target process PID 2096 wrote to memory of 2860 2096 01e93179d45a85ae8e88eb0dc78e90cf.exe 01e93179d45a85ae8e88eb0dc78e90cf.exe PID 2096 wrote to memory of 2860 2096 01e93179d45a85ae8e88eb0dc78e90cf.exe 01e93179d45a85ae8e88eb0dc78e90cf.exe PID 2096 wrote to memory of 2860 2096 01e93179d45a85ae8e88eb0dc78e90cf.exe 01e93179d45a85ae8e88eb0dc78e90cf.exe PID 2096 wrote to memory of 2860 2096 01e93179d45a85ae8e88eb0dc78e90cf.exe 01e93179d45a85ae8e88eb0dc78e90cf.exe PID 2096 wrote to memory of 2860 2096 01e93179d45a85ae8e88eb0dc78e90cf.exe 01e93179d45a85ae8e88eb0dc78e90cf.exe PID 2096 wrote to memory of 2860 2096 01e93179d45a85ae8e88eb0dc78e90cf.exe 01e93179d45a85ae8e88eb0dc78e90cf.exe PID 2096 wrote to memory of 2860 2096 01e93179d45a85ae8e88eb0dc78e90cf.exe 01e93179d45a85ae8e88eb0dc78e90cf.exe PID 2096 wrote to memory of 2860 2096 01e93179d45a85ae8e88eb0dc78e90cf.exe 01e93179d45a85ae8e88eb0dc78e90cf.exe PID 2096 wrote to memory of 2860 2096 01e93179d45a85ae8e88eb0dc78e90cf.exe 01e93179d45a85ae8e88eb0dc78e90cf.exe PID 2096 wrote to memory of 2860 2096 01e93179d45a85ae8e88eb0dc78e90cf.exe 01e93179d45a85ae8e88eb0dc78e90cf.exe PID 2860 wrote to memory of 2304 2860 01e93179d45a85ae8e88eb0dc78e90cf.exe Hgocoj.exe PID 2860 wrote to memory of 2304 2860 01e93179d45a85ae8e88eb0dc78e90cf.exe Hgocoj.exe PID 2860 wrote to memory of 2304 2860 01e93179d45a85ae8e88eb0dc78e90cf.exe Hgocoj.exe PID 2860 wrote to memory of 2304 2860 01e93179d45a85ae8e88eb0dc78e90cf.exe Hgocoj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01e93179d45a85ae8e88eb0dc78e90cf.exe"C:\Users\Admin\AppData\Local\Temp\01e93179d45a85ae8e88eb0dc78e90cf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\01e93179d45a85ae8e88eb0dc78e90cf.exe"C:\Users\Admin\AppData\Local\Temp\01e93179d45a85ae8e88eb0dc78e90cf.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\Hgocoj.exe"C:\Users\Admin\AppData\Roaming\Hgocoj.exe"3⤵
- Executes dropped EXE
PID:2304
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD501e93179d45a85ae8e88eb0dc78e90cf
SHA18c7207b5fbabe284ba0e080f1d73061a4ce0c294
SHA256b072d29bae0d53dfd1a70bc48cacc559535020d6e2b2039f8acdd53fe22053b9
SHA5120658da2ee6965e992542312a7b80a486403659dc0a42b4efa9b8239aa4ef69eec16c072ec08db50fa01dcecbee6953ef0fda056c998df349d29652dcf336cfff