Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
774969016d238e1c31940d610b0f051c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
774969016d238e1c31940d610b0f051c.exe
Resource
win10v2004-20231215-en
General
-
Target
774969016d238e1c31940d610b0f051c.exe
-
Size
120KB
-
MD5
774969016d238e1c31940d610b0f051c
-
SHA1
f01b1fc0995c9924b258deac369bbae1199f9dbe
-
SHA256
73d0fe702dd8247f22bc3dd90e16bc5f63184d4f4a40f6e27ed51c90cd788210
-
SHA512
e77d97dd73f6a1e81d74e31022704041366bd5247cfafe75a6c89500a278ca2a0225bdde523011ad6b1818a57d2737cc60457d77d58edfc83e8b293e90449e75
-
SSDEEP
1536:NIdcFLZp0dsrYgdRAgH0/m38wIJVOy2JDVhCK8:NIdcFLEdskgrt05bnwhVh6
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3624 idemoodp0cetka.exe 4852 idemoodp0cetka.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 774969016d238e1c31940d610b0f051c.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 774969016d238e1c31940d610b0f051c.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4428 set thread context of 5060 4428 774969016d238e1c31940d610b0f051c.exe 87 PID 3624 set thread context of 4852 3624 idemoodp0cetka.exe 93 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4428 774969016d238e1c31940d610b0f051c.exe 3624 idemoodp0cetka.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4428 wrote to memory of 5060 4428 774969016d238e1c31940d610b0f051c.exe 87 PID 4428 wrote to memory of 5060 4428 774969016d238e1c31940d610b0f051c.exe 87 PID 4428 wrote to memory of 5060 4428 774969016d238e1c31940d610b0f051c.exe 87 PID 4428 wrote to memory of 5060 4428 774969016d238e1c31940d610b0f051c.exe 87 PID 4428 wrote to memory of 5060 4428 774969016d238e1c31940d610b0f051c.exe 87 PID 4428 wrote to memory of 5060 4428 774969016d238e1c31940d610b0f051c.exe 87 PID 4428 wrote to memory of 5060 4428 774969016d238e1c31940d610b0f051c.exe 87 PID 4428 wrote to memory of 5060 4428 774969016d238e1c31940d610b0f051c.exe 87 PID 5060 wrote to memory of 3624 5060 774969016d238e1c31940d610b0f051c.exe 90 PID 5060 wrote to memory of 3624 5060 774969016d238e1c31940d610b0f051c.exe 90 PID 5060 wrote to memory of 3624 5060 774969016d238e1c31940d610b0f051c.exe 90 PID 3624 wrote to memory of 4852 3624 idemoodp0cetka.exe 93 PID 3624 wrote to memory of 4852 3624 idemoodp0cetka.exe 93 PID 3624 wrote to memory of 4852 3624 idemoodp0cetka.exe 93 PID 3624 wrote to memory of 4852 3624 idemoodp0cetka.exe 93 PID 3624 wrote to memory of 4852 3624 idemoodp0cetka.exe 93 PID 3624 wrote to memory of 4852 3624 idemoodp0cetka.exe 93 PID 3624 wrote to memory of 4852 3624 idemoodp0cetka.exe 93 PID 3624 wrote to memory of 4852 3624 idemoodp0cetka.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\774969016d238e1c31940d610b0f051c.exe"C:\Users\Admin\AppData\Local\Temp\774969016d238e1c31940d610b0f051c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\774969016d238e1c31940d610b0f051c.exe"C:\Users\Admin\AppData\Local\Temp\774969016d238e1c31940d610b0f051c.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"4⤵
- Executes dropped EXE
PID:4852
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5774969016d238e1c31940d610b0f051c
SHA1f01b1fc0995c9924b258deac369bbae1199f9dbe
SHA25673d0fe702dd8247f22bc3dd90e16bc5f63184d4f4a40f6e27ed51c90cd788210
SHA512e77d97dd73f6a1e81d74e31022704041366bd5247cfafe75a6c89500a278ca2a0225bdde523011ad6b1818a57d2737cc60457d77d58edfc83e8b293e90449e75