Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
526d7951a97374ff8c718d82e501093e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
526d7951a97374ff8c718d82e501093e.exe
Resource
win10v2004-20231215-en
General
-
Target
526d7951a97374ff8c718d82e501093e.exe
-
Size
17KB
-
MD5
526d7951a97374ff8c718d82e501093e
-
SHA1
1789d5d0beb35df4b1c87d6c071467455da9a439
-
SHA256
c9517c51aa5a1d45780f8da2a4b3396f07a0979031f8ce834f0329877d0c04f5
-
SHA512
eb7debea038e7fe2f9c523e58205a504f4bb3176c737122aec7b497d0af66a85615f9051f15f233de2766335c9bea601630d7d79c552806fae24c2d59ed4d588
-
SSDEEP
384:I5iFBXU63ba0n7PmpIfRRb0Gn1aNJawcudoD7UMxS:PBXUCa0HOnbcuyD7UMQ
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 526d7951a97374ff8c718d82e501093e.exe -
Executes dropped EXE 1 IoCs
pid Process 3632 coiome.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\safe360 = "C:\\Program Files\\Common Files\\sfbsbvx\\coiome.exe" mshta.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\sfbsbvx\coiome.exe 526d7951a97374ff8c718d82e501093e.exe File opened for modification C:\Program Files (x86)\Common Files\sfbsbvx\coiome.exe 526d7951a97374ff8c718d82e501093e.exe File opened for modification C:\Program Files (x86)\Common Files\sfbsbvx coiome.exe File opened for modification C:\Program Files (x86)\Common Files\sfbsbvx 526d7951a97374ff8c718d82e501093e.exe File created C:\Program Files (x86)\JUV.hta 526d7951a97374ff8c718d82e501093e.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3612 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 4968 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.52cailing.com" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\default_page_url = "http://www.52cailing.com" mshta.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.52cailing.com" mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings 526d7951a97374ff8c718d82e501093e.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4024 526d7951a97374ff8c718d82e501093e.exe Token: SeDebugPrivilege 4968 taskkill.exe Token: SeDebugPrivilege 3632 coiome.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4024 wrote to memory of 2180 4024 526d7951a97374ff8c718d82e501093e.exe 88 PID 4024 wrote to memory of 2180 4024 526d7951a97374ff8c718d82e501093e.exe 88 PID 4024 wrote to memory of 2180 4024 526d7951a97374ff8c718d82e501093e.exe 88 PID 4024 wrote to memory of 3268 4024 526d7951a97374ff8c718d82e501093e.exe 91 PID 4024 wrote to memory of 3268 4024 526d7951a97374ff8c718d82e501093e.exe 91 PID 4024 wrote to memory of 3268 4024 526d7951a97374ff8c718d82e501093e.exe 91 PID 3268 wrote to memory of 4968 3268 cmd.exe 93 PID 3268 wrote to memory of 4968 3268 cmd.exe 93 PID 3268 wrote to memory of 4968 3268 cmd.exe 93 PID 4024 wrote to memory of 3632 4024 526d7951a97374ff8c718d82e501093e.exe 101 PID 4024 wrote to memory of 3632 4024 526d7951a97374ff8c718d82e501093e.exe 101 PID 4024 wrote to memory of 3632 4024 526d7951a97374ff8c718d82e501093e.exe 101 PID 4024 wrote to memory of 3100 4024 526d7951a97374ff8c718d82e501093e.exe 103 PID 4024 wrote to memory of 3100 4024 526d7951a97374ff8c718d82e501093e.exe 103 PID 4024 wrote to memory of 3100 4024 526d7951a97374ff8c718d82e501093e.exe 103 PID 3632 wrote to memory of 3672 3632 coiome.exe 107 PID 3632 wrote to memory of 3672 3632 coiome.exe 107 PID 3632 wrote to memory of 3672 3632 coiome.exe 107 PID 3632 wrote to memory of 2956 3632 coiome.exe 110 PID 3632 wrote to memory of 2956 3632 coiome.exe 110 PID 3632 wrote to memory of 2956 3632 coiome.exe 110 PID 2956 wrote to memory of 4000 2956 cmd.exe 112 PID 2956 wrote to memory of 4000 2956 cmd.exe 112 PID 2956 wrote to memory of 4000 2956 cmd.exe 112 PID 3632 wrote to memory of 4584 3632 coiome.exe 113 PID 3632 wrote to memory of 4584 3632 coiome.exe 113 PID 3632 wrote to memory of 4584 3632 coiome.exe 113 PID 4584 wrote to memory of 2976 4584 cmd.exe 115 PID 4584 wrote to memory of 2976 4584 cmd.exe 115 PID 4584 wrote to memory of 2976 4584 cmd.exe 115 PID 3632 wrote to memory of 3852 3632 coiome.exe 116 PID 3632 wrote to memory of 3852 3632 coiome.exe 116 PID 3632 wrote to memory of 3852 3632 coiome.exe 116 PID 3632 wrote to memory of 4968 3632 coiome.exe 118 PID 3632 wrote to memory of 4968 3632 coiome.exe 118 PID 3632 wrote to memory of 4968 3632 coiome.exe 118 PID 3632 wrote to memory of 384 3632 coiome.exe 120 PID 3632 wrote to memory of 384 3632 coiome.exe 120 PID 3632 wrote to memory of 384 3632 coiome.exe 120 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4000 attrib.exe 2976 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\526d7951a97374ff8c718d82e501093e.exe"C:\Users\Admin\AppData\Local\Temp\526d7951a97374ff8c718d82e501093e.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Program Files (x86)\JUV.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:2180
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im coiome.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im coiome.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
-
C:\Program Files (x86)\Common Files\sfbsbvx\coiome.exe"C:\Program Files (x86)\Common Files\sfbsbvx\coiome.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\cmd.execmd /c sc delete JavaServe3⤵PID:3672
-
C:\Windows\SysWOW64\sc.exesc delete JavaServe4⤵
- Launches sc.exe
PID:3612
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Cookies\*.*"3⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Cookies\*.*"4⤵
- Views/modifies file attributes
PID:4000
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Local Settings\Temp\Cookies\*.*"4⤵
- Views/modifies file attributes
PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Cookies\*.*3⤵PID:3852
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temporary Internet Files\*.*"3⤵PID:4968
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵PID:384
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\526d7951a97374ff8c718d82e501093e.exe"2⤵PID:3100
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD536db137cd8798b20c996ae0b41168568
SHA1924e99f645944deaf2bac98f9661cb1284dbde84
SHA2568bc0a01fc97408bec77c63bfd4875009322ae8eff521cd577a4170f5325b1d5e
SHA512442ea78c3ce67fe77430a9ef514de3a9811d509cef7ace73dfec9c0ca76dcc9aa16253ba2443232d8e7367251bd849e2b911795a109f3b183edf965925513368
-
Filesize
780B
MD5cfae0efb683986503bb789616bad8b55
SHA19325f503e9c4d97a7d06d81859f73d245a974753
SHA2568f1076023a3e05a05e9938b08398e885a516f7442a19cd0de7fd3a87f6c0ccd8
SHA512e338c41006f670cc98554f1c3a262cc7e4d9dd680bd9d77cc2b5a048a7f3b630f59df6a02fe6542df71647ce3eb7541f86bc3266fad396a9859620a7d26a942c