Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 11:27
Static task
static1
Behavioral task
behavioral1
Sample
4e2e1f3ac55c19e9f30f8eb5e962d172.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e2e1f3ac55c19e9f30f8eb5e962d172.exe
Resource
win10v2004-20231215-en
General
-
Target
4e2e1f3ac55c19e9f30f8eb5e962d172.exe
-
Size
42KB
-
MD5
4e2e1f3ac55c19e9f30f8eb5e962d172
-
SHA1
37cb4556fb983bcfe043b04413d7faea5312b716
-
SHA256
2de69f07a6f6b29d11ada45396474e4186f7dc796a02a957c79f48dc4ae77bc2
-
SHA512
8981409c69e9b13bf99960efc345e4473198c87cc23b1590ecb5a9524572c85e47c4a19c4cef06b2f017fea442ba91e7750b496c5653fc2958d7abf37a4bec3d
-
SSDEEP
768:aYbywQ/j4ebRLNAYfQIVR8xS5auCo2Wc8TBxBzHFf4Oefx4hcldZPJUqycgLHY:SMGdNL4IVR8xS5aurhdHrh0dZxqx4
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Drivers\Atieccx.sys cmvd -
Executes dropped EXE 3 IoCs
pid Process 1756 svchost.exe 1608 sys 3756 cmvd -
Loads dropped DLL 1 IoCs
pid Process 1588 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\dbwozuyb.dll 4e2e1f3ac55c19e9f30f8eb5e962d172.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1488 set thread context of 1588 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 109 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Fonts\svchost.exe 4e2e1f3ac55c19e9f30f8eb5e962d172.exe File created C:\Windows\Downloaded Program Files\explorer.exe svchost.exe File created C:\Windows\Fonts\sys 4e2e1f3ac55c19e9f30f8eb5e962d172.exe File created C:\Windows\Fonts\cmvd 4e2e1f3ac55c19e9f30f8eb5e962d172.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://luck114.com" sys -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 1756 svchost.exe 1756 svchost.exe 1608 sys 1608 sys -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 668 Process not Found -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1488 wrote to memory of 1756 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 91 PID 1488 wrote to memory of 1756 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 91 PID 1488 wrote to memory of 1756 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 91 PID 1488 wrote to memory of 1608 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 102 PID 1488 wrote to memory of 1608 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 102 PID 1488 wrote to memory of 1608 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 102 PID 1608 wrote to memory of 1212 1608 sys 103 PID 1608 wrote to memory of 1212 1608 sys 103 PID 1608 wrote to memory of 1212 1608 sys 103 PID 1488 wrote to memory of 3756 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 105 PID 1488 wrote to memory of 3756 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 105 PID 1488 wrote to memory of 3756 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 105 PID 1488 wrote to memory of 1588 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 109 PID 1488 wrote to memory of 1588 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 109 PID 1488 wrote to memory of 1588 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 109 PID 1488 wrote to memory of 1588 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 109 PID 1488 wrote to memory of 4756 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 110 PID 1488 wrote to memory of 4756 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 110 PID 1488 wrote to memory of 4756 1488 4e2e1f3ac55c19e9f30f8eb5e962d172.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e2e1f3ac55c19e9f30f8eb5e962d172.exe"C:\Users\Admin\AppData\Local\Temp\4e2e1f3ac55c19e9f30f8eb5e962d172.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\Fonts\svchost.exeC:\Windows\Fonts\svchost.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
C:\Windows\Fonts\sysC:\Windows\Fonts\sys2⤵
- Executes dropped EXE
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\cmd.execmd /c del C:\Windows\Fonts\sys3⤵PID:1212
-
-
-
C:\Windows\Fonts\cmvdC:\Windows\Fonts\cmvd2⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:3756
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Loads dropped DLL
PID:1588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\DEL.bat2⤵PID:4756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5a9183e73dde5835593abd4761c73c1b4
SHA1146985905b167b730b16aa8cb9a8aa8275ae89c2
SHA25674081a6cbae959c4c0d1c967a6fdb313ba62ffdaeabd6d14fcd64d31e82ec297
SHA512227f00037d3a8ef030e71892de7821c4d0c4c34cdd8db92f93e2fe0fbc6841520c92bf322456132ef17b61d19a43c2c334d3b644befa5700f00914e2a50e7161
-
Filesize
5KB
MD59b8cffa5abe8350d9d9d2af54c851e50
SHA17adb7ef3bec64528806a327e70026dd7df11e8f5
SHA2566967469c99439ead9abf03f1fd3ac0153d4ef7f1906739fa75df45c2e67a3bec
SHA512a14c60a193b65e29f2c2c4580287d3d82371fb4b4a78fe1f68a39e2c1badff02bbecececa987cff92182d7ba6c4f3ce64e975fa7ce08197a5bf41942ba26ff7f
-
Filesize
1KB
MD5f4ed1044cc0d6cc42e440711fb793351
SHA132c7448eb4c5696b3c15322ddd9106e42eb22c10
SHA2565889649d626751af6b05482ecc398a02d453467f10fdfff2b94e50c85866488d
SHA51247d8a728bb18c1b8acdf1dcc9e66e9093bf332368ea202c21a00d9bb17983f83dbefab9ee1e0baee7f4be236de445f0ff83c9b4a69ca6055d1916df4c75b5e78
-
Filesize
13KB
MD5015a4e6ca2f0595f57d51aaa77744746
SHA1773c3cd62352264886c34e54b53bf4acdcf4432a
SHA256095f63cad6c7eb7f4b7a51e718e5f9debb48d1733121220d6c32fbda48cb1406
SHA5121e4d72353a845361c304a222e59838d9f0c2f025e12444f6f8ff8d9055af33b86ae22dd698154fd7ac6f906a7c985426629733d98bc71740a02a4c92b2734578
-
Filesize
182B
MD59542d4c7ac8e1ba543a61952b5cb7cd2
SHA191cc1cb364a761337935e99546d379db5892a19d
SHA256321612956a4cedcad9b71ebda90aea222124af71aef64a50317c689f6ef44d7e
SHA5126ab46d7a670502d0cc6765492f96b9b158fbd1fb627b8f758149a228300e96581167c968c5a74d19c57fb927d7e47825715a574c8d308d1ebf8db9009a1a415f