Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 13:43
Behavioral task
behavioral1
Sample
c0bbcc1266d11434d5a50ba752c73069.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0bbcc1266d11434d5a50ba752c73069.exe
Resource
win10v2004-20240226-en
General
-
Target
c0bbcc1266d11434d5a50ba752c73069.exe
-
Size
14KB
-
MD5
c0bbcc1266d11434d5a50ba752c73069
-
SHA1
cc8dc01210ca021cb903181d65874373d88bc79f
-
SHA256
b510ef45ffff63592b23eed367794631fe67f1dd14e473cdcfd87ec2ab2bf825
-
SHA512
99b86e8612c0f5287c837e6fbdc41fbecf7e5314f91863fdf448a513ba728fdb710bc6c1592d9a4af1028772e2e98a4ec6c6d46dea4e6c6a3dbc80ade8ecc7dd
-
SSDEEP
192:iPonnKKesSt4q2VOtQKYpghjgR8cri+jz4GWGYOuI9kxCZfrhhTTBS+qGaIHD7Nc:YonK/sStGDg1J47vRY8BfrnlL3hVkl
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2440 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2456 ezcronk.exe -
Loads dropped DLL 2 IoCs
pid Process 1972 c0bbcc1266d11434d5a50ba752c73069.exe 1972 c0bbcc1266d11434d5a50ba752c73069.exe -
resource yara_rule behavioral1/memory/1972-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x000b00000001507e-3.dat upx behavioral1/memory/2456-11-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/1972-12-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ezcronk.exe c0bbcc1266d11434d5a50ba752c73069.exe File opened for modification C:\Windows\SysWOW64\ezcronk.exe c0bbcc1266d11434d5a50ba752c73069.exe File created C:\Windows\SysWOW64\ezcron.dll c0bbcc1266d11434d5a50ba752c73069.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2456 1972 c0bbcc1266d11434d5a50ba752c73069.exe 28 PID 1972 wrote to memory of 2456 1972 c0bbcc1266d11434d5a50ba752c73069.exe 28 PID 1972 wrote to memory of 2456 1972 c0bbcc1266d11434d5a50ba752c73069.exe 28 PID 1972 wrote to memory of 2456 1972 c0bbcc1266d11434d5a50ba752c73069.exe 28 PID 1972 wrote to memory of 2440 1972 c0bbcc1266d11434d5a50ba752c73069.exe 31 PID 1972 wrote to memory of 2440 1972 c0bbcc1266d11434d5a50ba752c73069.exe 31 PID 1972 wrote to memory of 2440 1972 c0bbcc1266d11434d5a50ba752c73069.exe 31 PID 1972 wrote to memory of 2440 1972 c0bbcc1266d11434d5a50ba752c73069.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0bbcc1266d11434d5a50ba752c73069.exe"C:\Users\Admin\AppData\Local\Temp\c0bbcc1266d11434d5a50ba752c73069.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\ezcronk.exeC:\Windows\system32\ezcronk.exe ˜‰2⤵
- Executes dropped EXE
PID:2456
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\c0bbcc1266d11434d5a50ba752c73069.exe.bat2⤵
- Deletes itself
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5483ac8ae179093ed3bb0081aa711974e
SHA111d3e01d5e4d05698db46f9f51af82fb0ad2d7d7
SHA2564a544eacff9d1cb7ea0f594917bbd4ef55bef5556df45f78c60780c1a9fd14a5
SHA5129f583d10be18107e120f53c0005e01e00fb91d12ca7694adf2e3e4fd1600f0b8007d4a37644126e4255489d15240cda0fd92ed2c9e85178a0850a2895226a354
-
Filesize
14KB
MD5c0bbcc1266d11434d5a50ba752c73069
SHA1cc8dc01210ca021cb903181d65874373d88bc79f
SHA256b510ef45ffff63592b23eed367794631fe67f1dd14e473cdcfd87ec2ab2bf825
SHA51299b86e8612c0f5287c837e6fbdc41fbecf7e5314f91863fdf448a513ba728fdb710bc6c1592d9a4af1028772e2e98a4ec6c6d46dea4e6c6a3dbc80ade8ecc7dd