Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 03:23
Behavioral task
behavioral1
Sample
26435ca5f4b06ddc758bcd8c39955618.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26435ca5f4b06ddc758bcd8c39955618.exe
Resource
win10v2004-20231215-en
General
-
Target
26435ca5f4b06ddc758bcd8c39955618.exe
-
Size
12KB
-
MD5
26435ca5f4b06ddc758bcd8c39955618
-
SHA1
337b5f6c487f4a20fb8625de237a77589cc2706c
-
SHA256
a8a842c08d976e364b0039c9901296f224f653d3d5ccaefa6846d2b37e1d644a
-
SHA512
76ac98ae3b073dd9e11d477fd9f037f4add2144252087ba63ed1dbf51daed35e1e75780abd0b45f356d8af341e082d3d08d777d0f4bff7ba3bc7737dcdf8c4d8
-
SSDEEP
192:nPqfnykaUQ/ZatMdLhwepiJFDmvm8tkTuVvK8UxDQ9zVVU7SYycNtSk7:nPqcJZpDwegDmvm822exDmzVVU71b
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 3040 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1912 cueopsk.exe -
Loads dropped DLL 2 IoCs
pid Process 2188 26435ca5f4b06ddc758bcd8c39955618.exe 2188 26435ca5f4b06ddc758bcd8c39955618.exe -
resource yara_rule behavioral1/memory/2188-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2188-4-0x0000000000240000-0x000000000024F000-memory.dmp upx behavioral1/files/0x000900000001225e-3.dat upx behavioral1/memory/2188-11-0x0000000000240000-0x000000000024F000-memory.dmp upx behavioral1/memory/1912-12-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2188-13-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2188-17-0x0000000000240000-0x000000000024F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\cueops.dll 26435ca5f4b06ddc758bcd8c39955618.exe File created C:\Windows\SysWOW64\cueopsk.exe 26435ca5f4b06ddc758bcd8c39955618.exe File opened for modification C:\Windows\SysWOW64\cueopsk.exe 26435ca5f4b06ddc758bcd8c39955618.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1912 2188 26435ca5f4b06ddc758bcd8c39955618.exe 28 PID 2188 wrote to memory of 1912 2188 26435ca5f4b06ddc758bcd8c39955618.exe 28 PID 2188 wrote to memory of 1912 2188 26435ca5f4b06ddc758bcd8c39955618.exe 28 PID 2188 wrote to memory of 1912 2188 26435ca5f4b06ddc758bcd8c39955618.exe 28 PID 2188 wrote to memory of 3040 2188 26435ca5f4b06ddc758bcd8c39955618.exe 31 PID 2188 wrote to memory of 3040 2188 26435ca5f4b06ddc758bcd8c39955618.exe 31 PID 2188 wrote to memory of 3040 2188 26435ca5f4b06ddc758bcd8c39955618.exe 31 PID 2188 wrote to memory of 3040 2188 26435ca5f4b06ddc758bcd8c39955618.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\26435ca5f4b06ddc758bcd8c39955618.exe"C:\Users\Admin\AppData\Local\Temp\26435ca5f4b06ddc758bcd8c39955618.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cueopsk.exeC:\Windows\system32\cueopsk.exe ˜‰2⤵
- Executes dropped EXE
PID:1912
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\26435ca5f4b06ddc758bcd8c39955618.exe.bat2⤵
- Deletes itself
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5d8783fbca5b424e85bd961145ffc16ba
SHA198bf10cdb0fe39ec8e89832b9f3ea696741713d6
SHA25665e74301167975b5d1b9882301e65d49280006fc004066c71423be228de9695a
SHA51277c91b6991783b28234028904c6719944ae65b55de9012b05ace630e3546076aa8f995b15c98e5c8fdfed314a7cf4be1c7896604057ef5c6f08f781c3a386f06
-
Filesize
12KB
MD526435ca5f4b06ddc758bcd8c39955618
SHA1337b5f6c487f4a20fb8625de237a77589cc2706c
SHA256a8a842c08d976e364b0039c9901296f224f653d3d5ccaefa6846d2b37e1d644a
SHA51276ac98ae3b073dd9e11d477fd9f037f4add2144252087ba63ed1dbf51daed35e1e75780abd0b45f356d8af341e082d3d08d777d0f4bff7ba3bc7737dcdf8c4d8