Analysis
-
max time kernel
135s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 12:55
Static task
static1
Behavioral task
behavioral1
Sample
cb766ea31407d80cd68e39c9ebb33035.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb766ea31407d80cd68e39c9ebb33035.exe
Resource
win10v2004-20240226-en
General
-
Target
cb766ea31407d80cd68e39c9ebb33035.exe
-
Size
15KB
-
MD5
cb766ea31407d80cd68e39c9ebb33035
-
SHA1
2b0b6d8f58f12fa2049a8746e8dabf1b4d965b45
-
SHA256
d99543c0bbf2eea9b684acc9d662368ad460af7f55af7a489cc77089ae37a6e3
-
SHA512
a956915375ee2d0411b80b47e0e37bd52a7ae1338afd07038d02b4f2dd8e93a38cce34e85b412167e70999788d49bc60dc33e74e9ddba95b93af77d254b07143
-
SSDEEP
384:/qPKe+4fpf8RY3/6EbRW/z213u5qwClUhXllYM5yxos6W:/TY73yEWQ3BlUdlRybp
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\dcubjxiq.dll = "{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}" cb766ea31407d80cd68e39c9ebb33035.exe -
Loads dropped DLL 1 IoCs
pid Process 4964 cb766ea31407d80cd68e39c9ebb33035.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dcubjxiq.tmp cb766ea31407d80cd68e39c9ebb33035.exe File opened for modification C:\Windows\SysWOW64\dcubjxiq.nls cb766ea31407d80cd68e39c9ebb33035.exe File created C:\Windows\SysWOW64\dcubjxiq.tmp cb766ea31407d80cd68e39c9ebb33035.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07} cb766ea31407d80cd68e39c9ebb33035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}\InProcServer32 cb766ea31407d80cd68e39c9ebb33035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}\InProcServer32\ = "C:\\Windows\\SysWow64\\dcubjxiq.dll" cb766ea31407d80cd68e39c9ebb33035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}\InProcServer32\ThreadingModel = "Apartment" cb766ea31407d80cd68e39c9ebb33035.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4964 cb766ea31407d80cd68e39c9ebb33035.exe 4964 cb766ea31407d80cd68e39c9ebb33035.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4964 cb766ea31407d80cd68e39c9ebb33035.exe 4964 cb766ea31407d80cd68e39c9ebb33035.exe 4964 cb766ea31407d80cd68e39c9ebb33035.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4964 wrote to memory of 1268 4964 cb766ea31407d80cd68e39c9ebb33035.exe 104 PID 4964 wrote to memory of 1268 4964 cb766ea31407d80cd68e39c9ebb33035.exe 104 PID 4964 wrote to memory of 1268 4964 cb766ea31407d80cd68e39c9ebb33035.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb766ea31407d80cd68e39c9ebb33035.exe"C:\Users\Admin\AppData\Local\Temp\cb766ea31407d80cd68e39c9ebb33035.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\B1AC.tmp.bat2⤵PID:1268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5958f26df8e4c8bf7444a5f6f1c9ecfb2
SHA150f7ea15ed22ec8e1ec64ca477cd8c150d831cae
SHA256f6f8d802d55c59c6b53e4de6e75280f53e5b51a7f236d9b18795ad2ac20d8250
SHA51263b2ccbfd3791a86a85bedaa61030fa1a47159ed5f43637eaac716d5e4ee1b05080669141570b0bd136507202a77ecffab246ffa1c71c8b4bfea3af2c71eaff3
-
Filesize
2.1MB
MD5084c985520e602e0434d7a353602ca49
SHA1d637687b747f24d5a080b18bff98463e1fb9396d
SHA256b4bb4b262755a59685d9fb9e5bf5d847b2b81a926a4b29e9a0d4264481321544
SHA512ebfe69bfced58c3480fac46dca99c491fed18829674d982ee7b31f8174731df8027f2be30d63a4bf00601a81b5f86b9ad373c67a84670c539fc1828f5eb4e0e6