Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
59eecd91d6f5be7d23d9ad5eab1a788a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59eecd91d6f5be7d23d9ad5eab1a788a.exe
Resource
win10v2004-20231222-en
General
-
Target
59eecd91d6f5be7d23d9ad5eab1a788a.exe
-
Size
28KB
-
MD5
59eecd91d6f5be7d23d9ad5eab1a788a
-
SHA1
e282855f7f0226e9bc49c726b13e9a8f4dfbc5e3
-
SHA256
b4eed01f69422039d0f550f9edac95a1687b7a21b01879a0dfbc3b873e61642e
-
SHA512
d09e11e25aef1d8e477376cd9562e5b25d70c6c036ca6440757b1e93a594eb65e747c295bc9d14ead5f52a58c997f63f8ce22b8da9c50aeb9f67f1ff57f97a7c
-
SSDEEP
384:g9c/lju92SNHNjctHds2HUWT6VI/x/DryPS:g9kli9jNOtH70/VCLWP
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4768 attrib.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UUcallo = "c:\\woKuto.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main 59eecd91d6f5be7d23d9ad5eab1a788a.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.dxcpm.com/?33_20240114" 59eecd91d6f5be7d23d9ad5eab1a788a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3176 wrote to memory of 4500 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 87 PID 3176 wrote to memory of 4500 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 87 PID 3176 wrote to memory of 4500 3176 59eecd91d6f5be7d23d9ad5eab1a788a.exe 87 PID 4500 wrote to memory of 4768 4500 cmd.exe 89 PID 4500 wrote to memory of 4768 4500 cmd.exe 89 PID 4500 wrote to memory of 4768 4500 cmd.exe 89 PID 4500 wrote to memory of 4788 4500 cmd.exe 90 PID 4500 wrote to memory of 4788 4500 cmd.exe 90 PID 4500 wrote to memory of 4788 4500 cmd.exe 90 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4768 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59eecd91d6f5be7d23d9ad5eab1a788a.exe"C:\Users\Admin\AppData\Local\Temp\59eecd91d6f5be7d23d9ad5eab1a788a.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Dx.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h c:\woKuto.exe3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4768
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v UUcallo /t REG_SZ /d c:\woKuto.exe /f3⤵
- Adds Run key to start application
PID:4788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD55c1d779647a77ed9c6063e158e1ce2d6
SHA1f86b01604b602d607c3a8ceaf663137fe2df1131
SHA2561d40be51b63dbab25bdb8f1bad04a62f706c0ffdd430469b9b3363865e52818d
SHA51224b444547300ca745a4334002ff6247afa3f2835c1781b3ea8f4abe0c6160ccaafe3264a902d6da9625b4f0fcef3c75f069517c993d7754084894e86edc11fd7
-
Filesize
28KB
MD559eecd91d6f5be7d23d9ad5eab1a788a
SHA1e282855f7f0226e9bc49c726b13e9a8f4dfbc5e3
SHA256b4eed01f69422039d0f550f9edac95a1687b7a21b01879a0dfbc3b873e61642e
SHA512d09e11e25aef1d8e477376cd9562e5b25d70c6c036ca6440757b1e93a594eb65e747c295bc9d14ead5f52a58c997f63f8ce22b8da9c50aeb9f67f1ff57f97a7c