Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
1cedd10c9ff75b3a327d71bb48262e2c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1cedd10c9ff75b3a327d71bb48262e2c.exe
Resource
win10v2004-20231222-en
General
-
Target
1cedd10c9ff75b3a327d71bb48262e2c.exe
-
Size
284KB
-
MD5
1cedd10c9ff75b3a327d71bb48262e2c
-
SHA1
714ecbd82061ee7d79833d915736d7666111e761
-
SHA256
715df0723fe28ce8ec37e9820591f3ab26fdd58859b984a6d77328626e1747d4
-
SHA512
0cd74cbf82c4307f706e17acd912a3f673be7d137fe9e91d18aae6a25c4cb93bd2af2dce1feb919a8e1cbc4e0b2434a7153ce04b2fb38e7d59daf272afd8928d
-
SSDEEP
6144:6Zbf+b1vZSEyRlsblGulpn24/Zbf+b1UZ:2YnyeEulJ24FP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2956 smss.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\com\smss.exe 1cedd10c9ff75b3a327d71bb48262e2c.exe File created C:\Windows\SysWOW64\com\smss.exe 1cedd10c9ff75b3a327d71bb48262e2c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1732 1cedd10c9ff75b3a327d71bb48262e2c.exe 1732 1cedd10c9ff75b3a327d71bb48262e2c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2956 1732 1cedd10c9ff75b3a327d71bb48262e2c.exe 21 PID 1732 wrote to memory of 2956 1732 1cedd10c9ff75b3a327d71bb48262e2c.exe 21 PID 1732 wrote to memory of 2956 1732 1cedd10c9ff75b3a327d71bb48262e2c.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cedd10c9ff75b3a327d71bb48262e2c.exe"C:\Users\Admin\AppData\Local\Temp\1cedd10c9ff75b3a327d71bb48262e2c.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\com\smss.exec:\users\admin\appdata\local\temp\1cedd10c9ff75b3a327d71bb48262e2c.exe|c:\users\admin\appdata\local\temp\1cedd10c9ff75b3a327d71bb48262e2c.exe.log2⤵
- Executes dropped EXE
PID:2956
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD590ab7c7ab34313bebf11394e8d0e83c0
SHA16aa1cd9620e82f9b5f5d53797bd9895340a63f92
SHA256314b0d724385fab8147182367ca1f43bae22a4dcab1a88b3d2885b7af1545ad3
SHA51246663f89b50f11e614b695dc80f666d5ec8f469ecbf159ea097cf6cfdcc7d7b5de8bfadd5a87d006b62349474cd69c9074efdeb262a06cf27c67415775f726ae