Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
1ca18b6a656dba64eca29fb9607e0556.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ca18b6a656dba64eca29fb9607e0556.exe
Resource
win10v2004-20231215-en
General
-
Target
1ca18b6a656dba64eca29fb9607e0556.exe
-
Size
123KB
-
MD5
1ca18b6a656dba64eca29fb9607e0556
-
SHA1
993923a2981223d7d32a4a0f6fde424c07b4c5a8
-
SHA256
e2087ba92c46f46e0293f6040a1bbbc29558693ba295072fd7056431b291d594
-
SHA512
3eee6edf517eb925baebb5057e2e5e1194327c690d4a619483635e4785f4985e81f82c4ec865d849715eff68281a4778a603da624c23ed5814b54fb3874b36f3
-
SSDEEP
3072:s9WnYVCDN+l0S8r+GX6iyA3ONmZwXWDQxyjV9dyMEcNdOfXqS:s8Y2Nzd+J/BMyWDQbc8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2720 Cwoqaa.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Cwoqaa.exe 1ca18b6a656dba64eca29fb9607e0556.exe File opened for modification C:\Windows\Cwoqaa.exe 1ca18b6a656dba64eca29fb9607e0556.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Cwoqaa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Cwoqaa.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 1ca18b6a656dba64eca29fb9607e0556.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 1ca18b6a656dba64eca29fb9607e0556.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main Cwoqaa.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International Cwoqaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe 2720 Cwoqaa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2884 1ca18b6a656dba64eca29fb9607e0556.exe 2720 Cwoqaa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2720 2884 1ca18b6a656dba64eca29fb9607e0556.exe 28 PID 2884 wrote to memory of 2720 2884 1ca18b6a656dba64eca29fb9607e0556.exe 28 PID 2884 wrote to memory of 2720 2884 1ca18b6a656dba64eca29fb9607e0556.exe 28 PID 2884 wrote to memory of 2720 2884 1ca18b6a656dba64eca29fb9607e0556.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ca18b6a656dba64eca29fb9607e0556.exe"C:\Users\Admin\AppData\Local\Temp\1ca18b6a656dba64eca29fb9607e0556.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\Cwoqaa.exeC:\Windows\Cwoqaa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD51ca18b6a656dba64eca29fb9607e0556
SHA1993923a2981223d7d32a4a0f6fde424c07b4c5a8
SHA256e2087ba92c46f46e0293f6040a1bbbc29558693ba295072fd7056431b291d594
SHA5123eee6edf517eb925baebb5057e2e5e1194327c690d4a619483635e4785f4985e81f82c4ec865d849715eff68281a4778a603da624c23ed5814b54fb3874b36f3
-
Filesize
344B
MD5a83e3664e307728f39dca8c8cc964557
SHA11da1f4a3a613e703870b21c00a9d4d6614ed63ed
SHA25696638f283aa953492e7c48f77761a87f5b110874b0ff6042515ea2848789c123
SHA512df0b6baa60aaff7fa81fed0122138be170360115878b892b6b50a13dcaf5ddb36547caf89fc617ec1633f0376d655450501855e71abf61b794c93870e6da6d7a