Analysis
-
max time kernel
153s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 01:22
Behavioral task
behavioral1
Sample
641c3c7d49843b55abaa3d465f6dc34a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
641c3c7d49843b55abaa3d465f6dc34a.exe
Resource
win10v2004-20231215-en
General
-
Target
641c3c7d49843b55abaa3d465f6dc34a.exe
-
Size
466KB
-
MD5
641c3c7d49843b55abaa3d465f6dc34a
-
SHA1
406c97e453d90abcc92bcc367737b04c7f5c7d6f
-
SHA256
67194d7cca91a384ff434f919afa6092d4864d8cc5270db0e305c0f0dbd10aa8
-
SHA512
f40df88c8efa781c69f5d6f3b19c93e72e3fbac9eee061271bc7e5b7c6eded93ad4b3833bb47d3c424992064859506ef22e82647d65570522b0173772293cf85
-
SSDEEP
3072:hH+j007BHFVmoXgS8+E3xeChcrtDL2BJehd5xjnhvOygYCH8F/P3YuFON:h1mBfVXyq1rEBJyjp4cFPr4N
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2624 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2676 acdo.exe -
Loads dropped DLL 2 IoCs
pid Process 1732 641c3c7d49843b55abaa3d465f6dc34a.exe 1732 641c3c7d49843b55abaa3d465f6dc34a.exe -
resource yara_rule behavioral1/memory/1732-0-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/files/0x0037000000015daa-6.dat upx behavioral1/memory/1732-13-0x0000000002220000-0x0000000002296000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\{443CA79A-40FF-B279-3403-045D49EB886B} = "C:\\Users\\Admin\\AppData\\Roaming\\Ohug\\acdo.exe" acdo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1732 set thread context of 2624 1732 641c3c7d49843b55abaa3d465f6dc34a.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Privacy 641c3c7d49843b55abaa3d465f6dc34a.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 641c3c7d49843b55abaa3d465f6dc34a.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe 2676 acdo.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1732 641c3c7d49843b55abaa3d465f6dc34a.exe Token: SeSecurityPrivilege 1732 641c3c7d49843b55abaa3d465f6dc34a.exe Token: SeSecurityPrivilege 1732 641c3c7d49843b55abaa3d465f6dc34a.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2676 1732 641c3c7d49843b55abaa3d465f6dc34a.exe 28 PID 1732 wrote to memory of 2676 1732 641c3c7d49843b55abaa3d465f6dc34a.exe 28 PID 1732 wrote to memory of 2676 1732 641c3c7d49843b55abaa3d465f6dc34a.exe 28 PID 1732 wrote to memory of 2676 1732 641c3c7d49843b55abaa3d465f6dc34a.exe 28 PID 2676 wrote to memory of 1244 2676 acdo.exe 12 PID 2676 wrote to memory of 1244 2676 acdo.exe 12 PID 2676 wrote to memory of 1244 2676 acdo.exe 12 PID 2676 wrote to memory of 1244 2676 acdo.exe 12 PID 2676 wrote to memory of 1244 2676 acdo.exe 12 PID 2676 wrote to memory of 1328 2676 acdo.exe 15 PID 2676 wrote to memory of 1328 2676 acdo.exe 15 PID 2676 wrote to memory of 1328 2676 acdo.exe 15 PID 2676 wrote to memory of 1328 2676 acdo.exe 15 PID 2676 wrote to memory of 1328 2676 acdo.exe 15 PID 2676 wrote to memory of 1372 2676 acdo.exe 14 PID 2676 wrote to memory of 1372 2676 acdo.exe 14 PID 2676 wrote to memory of 1372 2676 acdo.exe 14 PID 2676 wrote to memory of 1372 2676 acdo.exe 14 PID 2676 wrote to memory of 1372 2676 acdo.exe 14 PID 2676 wrote to memory of 1732 2676 acdo.exe 27 PID 2676 wrote to memory of 1732 2676 acdo.exe 27 PID 2676 wrote to memory of 1732 2676 acdo.exe 27 PID 2676 wrote to memory of 1732 2676 acdo.exe 27 PID 2676 wrote to memory of 1732 2676 acdo.exe 27 PID 1732 wrote to memory of 2624 1732 641c3c7d49843b55abaa3d465f6dc34a.exe 29 PID 1732 wrote to memory of 2624 1732 641c3c7d49843b55abaa3d465f6dc34a.exe 29 PID 1732 wrote to memory of 2624 1732 641c3c7d49843b55abaa3d465f6dc34a.exe 29 PID 1732 wrote to memory of 2624 1732 641c3c7d49843b55abaa3d465f6dc34a.exe 29 PID 1732 wrote to memory of 2624 1732 641c3c7d49843b55abaa3d465f6dc34a.exe 29 PID 1732 wrote to memory of 2624 1732 641c3c7d49843b55abaa3d465f6dc34a.exe 29 PID 1732 wrote to memory of 2624 1732 641c3c7d49843b55abaa3d465f6dc34a.exe 29 PID 1732 wrote to memory of 2624 1732 641c3c7d49843b55abaa3d465f6dc34a.exe 29 PID 1732 wrote to memory of 2624 1732 641c3c7d49843b55abaa3d465f6dc34a.exe 29 PID 2676 wrote to memory of 1724 2676 acdo.exe 31 PID 2676 wrote to memory of 1724 2676 acdo.exe 31 PID 2676 wrote to memory of 1724 2676 acdo.exe 31 PID 2676 wrote to memory of 1724 2676 acdo.exe 31 PID 2676 wrote to memory of 1724 2676 acdo.exe 31 PID 2676 wrote to memory of 2872 2676 acdo.exe 32 PID 2676 wrote to memory of 2872 2676 acdo.exe 32 PID 2676 wrote to memory of 2872 2676 acdo.exe 32 PID 2676 wrote to memory of 2872 2676 acdo.exe 32 PID 2676 wrote to memory of 2872 2676 acdo.exe 32 PID 2676 wrote to memory of 2444 2676 acdo.exe 33 PID 2676 wrote to memory of 2444 2676 acdo.exe 33 PID 2676 wrote to memory of 2444 2676 acdo.exe 33 PID 2676 wrote to memory of 2444 2676 acdo.exe 33 PID 2676 wrote to memory of 2444 2676 acdo.exe 33
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1244
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\641c3c7d49843b55abaa3d465f6dc34a.exe"C:\Users\Admin\AppData\Local\Temp\641c3c7d49843b55abaa3d465f6dc34a.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Roaming\Ohug\acdo.exe"C:\Users\Admin\AppData\Roaming\Ohug\acdo.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp04ceaea7.bat"3⤵
- Deletes itself
PID:2624
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1328
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1724
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2872
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD58360bf98bec2945f4cba6b0eb0a6d151
SHA1be997799b6ecbefa7c2658172d1b7584cb3183d6
SHA256de8c873561bf190631a1a19471bfad2171a04d691925a5cde4ab03c45c388af7
SHA51202a9653e8ee1ac2e9d1bdd889cbb7dba268a00211306504dd82d704b00e574c1e5f0078c417e0dc361b39fbbabae3560453c1859b870541772c188c60db9e3b8
-
Filesize
366B
MD5e4a6b8382964015ca34da9ce98c67e4e
SHA1f51adfbd25287348e8b502ba8a8da411c8069bdd
SHA2565708e8a0818131147e2254ff51ee402dd70c469f629bf7b25cc710fce67ae170
SHA5125fdebc79f2cc19ca47daebdd2ae74f9c49a55f4fc9329d58bad2916b5f6d4ed51f21632c65f768acc5e2d1a59387b9eea0c8a2aecd6f29661f15b5774f3f8e6a
-
Filesize
466KB
MD5ab631002e2ea3b2391733a4614c0b0e3
SHA14338a8fcd223442d8db2a69dfe304a4fce45cff4
SHA256870017ff282015fb7a0f8be56dc1ae3e813c72c5a3b320de24e3327bc369f5f6
SHA512a39eecd87b0e09db10a5cd9dfecfa98e4d42ddaec1c663e4554563ecfded05c97ab8e83654899d137703388fd6968997040055517737cf3a7e0974747136bf72