Overview
overview
7Static
static
3CCProxy.exe
windows7-x64
1CCProxy.exe
windows10-2004-x64
1CDial.dll
windows7-x64
3CDial.dll
windows10-2004-x64
3Language/C...GB.chm
windows7-x64
1Language/C...GB.chm
windows10-2004-x64
1Language/English.chm
windows7-x64
1Language/English.chm
windows10-2004-x64
1unins000.exe
windows7-x64
7unins000.exe
windows10-2004-x64
7uuid.dll
windows7-x64
3uuid.dll
windows10-2004-x64
3web/_acclist2.js
windows7-x64
1web/_acclist2.js
windows10-2004-x64
1web/accadd.js
windows7-x64
1web/accadd.js
windows10-2004-x64
1web/accheader.htm
windows7-x64
1web/accheader.htm
windows10-2004-x64
1web/acclist.js
windows7-x64
1web/acclist.js
windows10-2004-x64
1web/acclist2.js
windows7-x64
1web/acclist2.js
windows10-2004-x64
1web/account.htm
windows7-x64
1web/account.htm
windows10-2004-x64
1web/index.html
windows7-x64
1web/index.html
windows10-2004-x64
1web/list.htm
windows7-x64
1web/list.htm
windows10-2004-x64
1web/log.htm
windows7-x64
1web/log.htm
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:29
Static task
static1
Behavioral task
behavioral1
Sample
CCProxy.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
CCProxy.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
CDial.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
CDial.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Language/ChineseGB.chm
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Language/ChineseGB.chm
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Language/English.chm
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Language/English.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
unins000.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
unins000.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
uuid.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
uuid.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
web/_acclist2.js
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
web/_acclist2.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
web/accadd.js
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
web/accadd.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
web/accheader.htm
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
web/accheader.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
web/acclist.js
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
web/acclist.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
web/acclist2.js
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
web/acclist2.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
web/account.htm
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
web/account.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
web/index.html
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
web/index.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
web/list.htm
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
web/list.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
web/log.htm
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
web/log.htm
Resource
win10v2004-20231215-en
General
-
Target
unins000.exe
-
Size
69KB
-
MD5
4430cc72b3a69e91f42043950461fbd1
-
SHA1
23ba36fbb3c9fc3550ac0a1b741b98b664c82832
-
SHA256
50c32b8b80073c71dddb3997b147e9903e60ac6ee5c25df237bfce83cbbda646
-
SHA512
525d41749f571e951610cf6088a19a4ecaf8a299a2369610a79ab9ee5b5fe50cebd012fc0aa7302cf1ee6dc24fba841c2eb98dde5d0c6cacdd0bcbc17b2fa834
-
SSDEEP
1536:HVqNCLKfnv/U+otE3CLjUDjtsLEXR41dxXtQ0:eCLynXGqi2si41dxp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2628 _iu14D2N.tmp -
Executes dropped EXE 1 IoCs
pid Process 2628 _iu14D2N.tmp -
Loads dropped DLL 1 IoCs
pid Process 1836 unins000.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2628 1836 unins000.exe 28 PID 1836 wrote to memory of 2628 1836 unins000.exe 28 PID 1836 wrote to memory of 2628 1836 unins000.exe 28 PID 1836 wrote to memory of 2628 1836 unins000.exe 28 PID 1836 wrote to memory of 2628 1836 unins000.exe 28 PID 1836 wrote to memory of 2628 1836 unins000.exe 28 PID 1836 wrote to memory of 2628 1836 unins000.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\unins000.exe"C:\Users\Admin\AppData\Local\Temp\unins000.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmpC:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp /EUFT32A C:\Users\Admin\AppData\Local\Temp\unins000.exe $701262⤵
- Deletes itself
- Executes dropped EXE
PID:2628
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD54430cc72b3a69e91f42043950461fbd1
SHA123ba36fbb3c9fc3550ac0a1b741b98b664c82832
SHA25650c32b8b80073c71dddb3997b147e9903e60ac6ee5c25df237bfce83cbbda646
SHA512525d41749f571e951610cf6088a19a4ecaf8a299a2369610a79ab9ee5b5fe50cebd012fc0aa7302cf1ee6dc24fba841c2eb98dde5d0c6cacdd0bcbc17b2fa834