Analysis
-
max time kernel
1s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 05:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1014072485c91f77713e68258bf794df.exe
Resource
win7-20231215-en
windows7-x64
13 signatures
150 seconds
Behavioral task
behavioral2
Sample
1014072485c91f77713e68258bf794df.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
1014072485c91f77713e68258bf794df.exe
-
Size
563KB
-
MD5
1014072485c91f77713e68258bf794df
-
SHA1
3ba18050f2d3f882a5a0bbf1866542b0730a47f2
-
SHA256
e8a3fbef6f12cf9a7e499c990bd3ebf5b305c8c7c1aafc7090ffaa9972ffb685
-
SHA512
4879e702d13e94398a0b0d033b53a89f9418e313369e7e04e324f6605186a981e2611a2a8d82774398b783b5c2ee8d9d9221300cbf6d78a371db1f7b7e0c4f66
-
SSDEEP
12288:YwX5pxng9W3aOs7ZAl+JcecUDwt4lhKX6OC0puOtOCRJ3:YUpO0ajiAcecUDw+39I
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2036 cloudweb_svc.ex_ 216 cloudweb_svc.ex_ -
Loads dropped DLL 7 IoCs
pid Process 4920 1014072485c91f77713e68258bf794df.exe 4920 1014072485c91f77713e68258bf794df.exe 4920 1014072485c91f77713e68258bf794df.exe 4920 1014072485c91f77713e68258bf794df.exe 4920 1014072485c91f77713e68258bf794df.exe 4920 1014072485c91f77713e68258bf794df.exe 4920 1014072485c91f77713e68258bf794df.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\CloudWeb\CloudWeb_mime_2_61.dl_ 1014072485c91f77713e68258bf794df.exe File created C:\Program Files (x86)\CloudWeb\CloudWeb_run.ex_ 1014072485c91f77713e68258bf794df.exe File created C:\Program Files (x86)\CloudWeb\CloudWeb_2_61.dl_ 1014072485c91f77713e68258bf794df.exe File created C:\Program Files (x86)\CloudWeb\CloudWeb_nad_2_61.dl_ 1014072485c91f77713e68258bf794df.exe File created C:\Program Files (x86)\CloudWeb\cloudweb_svc.ex_ 1014072485c91f77713e68258bf794df.exe File created C:\Program Files (x86)\CloudWeb\CloudWeb_tb_2_61.dl_ 1014072485c91f77713e68258bf794df.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main 1014072485c91f77713e68258bf794df.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" 1014072485c91f77713e68258bf794df.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.application 1014072485c91f77713e68258bf794df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.application\sid = "Mzc3MUM2MDEtRTMyNy00NTgwLTkwMUItMDAwRjFCQTkzRDI1" 1014072485c91f77713e68258bf794df.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4920 1014072485c91f77713e68258bf794df.exe 4920 1014072485c91f77713e68258bf794df.exe 4920 1014072485c91f77713e68258bf794df.exe 4920 1014072485c91f77713e68258bf794df.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4920 wrote to memory of 2036 4920 1014072485c91f77713e68258bf794df.exe 24 PID 4920 wrote to memory of 2036 4920 1014072485c91f77713e68258bf794df.exe 24 PID 4920 wrote to memory of 2036 4920 1014072485c91f77713e68258bf794df.exe 24 PID 4920 wrote to memory of 216 4920 1014072485c91f77713e68258bf794df.exe 23 PID 4920 wrote to memory of 216 4920 1014072485c91f77713e68258bf794df.exe 23 PID 4920 wrote to memory of 216 4920 1014072485c91f77713e68258bf794df.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\1014072485c91f77713e68258bf794df.exe"C:\Users\Admin\AppData\Local\Temp\1014072485c91f77713e68258bf794df.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files (x86)\CloudWeb\cloudweb_svc.ex_"C:\Program Files (x86)\CloudWeb\cloudweb_svc.ex_" /u2⤵
- Executes dropped EXE
PID:216
-
-
C:\Program Files (x86)\CloudWeb\cloudweb_svc.ex_"C:\Program Files (x86)\CloudWeb\cloudweb_svc.ex_" /stop2⤵
- Executes dropped EXE
PID:2036
-
-
C:\Program Files (x86)\CloudWeb\cloudweb_svc.exe"C:\Program Files (x86)\CloudWeb\cloudweb_svc.exe" /start2⤵PID:4956
-
-
C:\Program Files (x86)\CloudWeb\cloudweb_svc.exe"C:\Program Files (x86)\CloudWeb\cloudweb_svc.exe" /i2⤵PID:904
-
-
C:\Program Files (x86)\CloudWeb\cloudweb_svc.exe"C:\Program Files (x86)\CloudWeb\cloudweb_svc.exe"1⤵PID:3504