Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
cc6c15a569dec7794d076732cff33a93.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc6c15a569dec7794d076732cff33a93.exe
Resource
win10v2004-20240226-en
General
-
Target
cc6c15a569dec7794d076732cff33a93.exe
-
Size
121KB
-
MD5
cc6c15a569dec7794d076732cff33a93
-
SHA1
786795a1ecf3b7fd69d4b56fc2bc37dfaee45a83
-
SHA256
6359d61a855f8bc5972922e31cabfbdb96c9c7d4c0c3f9a07f9ed46b8584777c
-
SHA512
32239c3adbb3ee9c344f355655c8ecd8976b604c65b73dd0ea6527396922803fcbebfd9642b020701ff951a39e4b48be5f2b9bf179b6cbe61bba4db033915452
-
SSDEEP
3072:tf9l7j5fS4XBHvDcwyDLS12XFIzSjtV2bGtJFr8G:VRfS0vwLDmc3jt8bAj/
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 3472 svchos.exe 2320 svchos.exe 5064 svchos.exe 3956 svchos.exe 4396 svchos.exe 632 svchos.exe 2408 svchos.exe 784 svchos.exe 4128 svchos.exe 3284 svchos.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchos.exe svchos.exe File created C:\Windows\SysWOW64\svchos.exe svchos.exe File created C:\Windows\SysWOW64\svchos.exe svchos.exe File opened for modification C:\Windows\SysWOW64\svchos.exe svchos.exe File opened for modification C:\Windows\SysWOW64\svchos.exe svchos.exe File opened for modification C:\Windows\SysWOW64\svchos.exe svchos.exe File created C:\Windows\SysWOW64\svchos.exe svchos.exe File created C:\Windows\SysWOW64\svchos.exe svchos.exe File opened for modification C:\Windows\SysWOW64\svchos.exe svchos.exe File created C:\Windows\SysWOW64\svchos.exe svchos.exe File created C:\Windows\SysWOW64\svchos.exe svchos.exe File opened for modification C:\Windows\SysWOW64\svchos.exe svchos.exe File opened for modification C:\Windows\SysWOW64\svchos.exe cc6c15a569dec7794d076732cff33a93.exe File opened for modification C:\Windows\SysWOW64\svchos.exe svchos.exe File opened for modification C:\Windows\SysWOW64\svchos.exe svchos.exe File created C:\Windows\SysWOW64\svchos.exe svchos.exe File created C:\Windows\SysWOW64\svchos.exe svchos.exe File created C:\Windows\SysWOW64\svchos.exe svchos.exe File opened for modification C:\Windows\SysWOW64\svchos.exe svchos.exe File opened for modification C:\Windows\SysWOW64\svchos.exe svchos.exe File created C:\Windows\SysWOW64\svchos.exe svchos.exe File created C:\Windows\SysWOW64\svchos.exe cc6c15a569dec7794d076732cff33a93.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1596 wrote to memory of 3472 1596 cc6c15a569dec7794d076732cff33a93.exe 87 PID 1596 wrote to memory of 3472 1596 cc6c15a569dec7794d076732cff33a93.exe 87 PID 1596 wrote to memory of 3472 1596 cc6c15a569dec7794d076732cff33a93.exe 87 PID 3472 wrote to memory of 2320 3472 svchos.exe 99 PID 3472 wrote to memory of 2320 3472 svchos.exe 99 PID 3472 wrote to memory of 2320 3472 svchos.exe 99 PID 2320 wrote to memory of 5064 2320 svchos.exe 102 PID 2320 wrote to memory of 5064 2320 svchos.exe 102 PID 2320 wrote to memory of 5064 2320 svchos.exe 102 PID 5064 wrote to memory of 3956 5064 svchos.exe 104 PID 5064 wrote to memory of 3956 5064 svchos.exe 104 PID 5064 wrote to memory of 3956 5064 svchos.exe 104 PID 3956 wrote to memory of 4396 3956 svchos.exe 105 PID 3956 wrote to memory of 4396 3956 svchos.exe 105 PID 3956 wrote to memory of 4396 3956 svchos.exe 105 PID 4396 wrote to memory of 632 4396 svchos.exe 107 PID 4396 wrote to memory of 632 4396 svchos.exe 107 PID 4396 wrote to memory of 632 4396 svchos.exe 107 PID 632 wrote to memory of 2408 632 svchos.exe 108 PID 632 wrote to memory of 2408 632 svchos.exe 108 PID 632 wrote to memory of 2408 632 svchos.exe 108 PID 2408 wrote to memory of 784 2408 svchos.exe 117 PID 2408 wrote to memory of 784 2408 svchos.exe 117 PID 2408 wrote to memory of 784 2408 svchos.exe 117 PID 784 wrote to memory of 4128 784 svchos.exe 118 PID 784 wrote to memory of 4128 784 svchos.exe 118 PID 784 wrote to memory of 4128 784 svchos.exe 118 PID 4128 wrote to memory of 3284 4128 svchos.exe 122 PID 4128 wrote to memory of 3284 4128 svchos.exe 122 PID 4128 wrote to memory of 3284 4128 svchos.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc6c15a569dec7794d076732cff33a93.exe"C:\Users\Admin\AppData\Local\Temp\cc6c15a569dec7794d076732cff33a93.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\svchos.exeC:\Windows\system32\svchos.exe 1040 "C:\Users\Admin\AppData\Local\Temp\cc6c15a569dec7794d076732cff33a93.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\svchos.exeC:\Windows\system32\svchos.exe 1152 "C:\Windows\SysWOW64\svchos.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\svchos.exeC:\Windows\system32\svchos.exe 1128 "C:\Windows\SysWOW64\svchos.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\svchos.exeC:\Windows\system32\svchos.exe 1132 "C:\Windows\SysWOW64\svchos.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\svchos.exeC:\Windows\system32\svchos.exe 1124 "C:\Windows\SysWOW64\svchos.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\svchos.exeC:\Windows\system32\svchos.exe 1136 "C:\Windows\SysWOW64\svchos.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\svchos.exeC:\Windows\system32\svchos.exe 1144 "C:\Windows\SysWOW64\svchos.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\svchos.exeC:\Windows\system32\svchos.exe 1116 "C:\Windows\SysWOW64\svchos.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\svchos.exeC:\Windows\system32\svchos.exe 1104 "C:\Windows\SysWOW64\svchos.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\svchos.exeC:\Windows\system32\svchos.exe 1160 "C:\Windows\SysWOW64\svchos.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3284
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD5cc6c15a569dec7794d076732cff33a93
SHA1786795a1ecf3b7fd69d4b56fc2bc37dfaee45a83
SHA2566359d61a855f8bc5972922e31cabfbdb96c9c7d4c0c3f9a07f9ed46b8584777c
SHA51232239c3adbb3ee9c344f355655c8ecd8976b604c65b73dd0ea6527396922803fcbebfd9642b020701ff951a39e4b48be5f2b9bf179b6cbe61bba4db033915452