Analysis
-
max time kernel
48s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:23
Behavioral task
behavioral1
Sample
26435ca5f4b06ddc758bcd8c39955618.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26435ca5f4b06ddc758bcd8c39955618.exe
Resource
win10v2004-20231215-en
General
-
Target
26435ca5f4b06ddc758bcd8c39955618.exe
-
Size
12KB
-
MD5
26435ca5f4b06ddc758bcd8c39955618
-
SHA1
337b5f6c487f4a20fb8625de237a77589cc2706c
-
SHA256
a8a842c08d976e364b0039c9901296f224f653d3d5ccaefa6846d2b37e1d644a
-
SHA512
76ac98ae3b073dd9e11d477fd9f037f4add2144252087ba63ed1dbf51daed35e1e75780abd0b45f356d8af341e082d3d08d777d0f4bff7ba3bc7737dcdf8c4d8
-
SSDEEP
192:nPqfnykaUQ/ZatMdLhwepiJFDmvm8tkTuVvK8UxDQ9zVVU7SYycNtSk7:nPqcJZpDwegDmvm822exDmzVVU71b
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 116 cueopsk.exe -
resource yara_rule behavioral2/memory/1912-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0009000000023200-4.dat upx behavioral2/memory/1912-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/116-7-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\cueopsk.exe 26435ca5f4b06ddc758bcd8c39955618.exe File created C:\Windows\SysWOW64\cueops.dll 26435ca5f4b06ddc758bcd8c39955618.exe File created C:\Windows\SysWOW64\cueopsk.exe 26435ca5f4b06ddc758bcd8c39955618.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1912 wrote to memory of 116 1912 26435ca5f4b06ddc758bcd8c39955618.exe 89 PID 1912 wrote to memory of 116 1912 26435ca5f4b06ddc758bcd8c39955618.exe 89 PID 1912 wrote to memory of 116 1912 26435ca5f4b06ddc758bcd8c39955618.exe 89 PID 1912 wrote to memory of 2448 1912 26435ca5f4b06ddc758bcd8c39955618.exe 103 PID 1912 wrote to memory of 2448 1912 26435ca5f4b06ddc758bcd8c39955618.exe 103 PID 1912 wrote to memory of 2448 1912 26435ca5f4b06ddc758bcd8c39955618.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\26435ca5f4b06ddc758bcd8c39955618.exe"C:\Users\Admin\AppData\Local\Temp\26435ca5f4b06ddc758bcd8c39955618.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\cueopsk.exeC:\Windows\system32\cueopsk.exe ˜‰2⤵
- Executes dropped EXE
PID:116
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\26435ca5f4b06ddc758bcd8c39955618.exe.bat2⤵PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5d8783fbca5b424e85bd961145ffc16ba
SHA198bf10cdb0fe39ec8e89832b9f3ea696741713d6
SHA25665e74301167975b5d1b9882301e65d49280006fc004066c71423be228de9695a
SHA51277c91b6991783b28234028904c6719944ae65b55de9012b05ace630e3546076aa8f995b15c98e5c8fdfed314a7cf4be1c7896604057ef5c6f08f781c3a386f06
-
Filesize
12KB
MD526435ca5f4b06ddc758bcd8c39955618
SHA1337b5f6c487f4a20fb8625de237a77589cc2706c
SHA256a8a842c08d976e364b0039c9901296f224f653d3d5ccaefa6846d2b37e1d644a
SHA51276ac98ae3b073dd9e11d477fd9f037f4add2144252087ba63ed1dbf51daed35e1e75780abd0b45f356d8af341e082d3d08d777d0f4bff7ba3bc7737dcdf8c4d8