Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 19:30
Static task
static1
Behavioral task
behavioral1
Sample
cc3d39dea52b4f0f632cdaa84c37d1e4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cc3d39dea52b4f0f632cdaa84c37d1e4.exe
Resource
win10v2004-20240226-en
General
-
Target
cc3d39dea52b4f0f632cdaa84c37d1e4.exe
-
Size
464KB
-
MD5
cc3d39dea52b4f0f632cdaa84c37d1e4
-
SHA1
0b818f49d765925b2763d9e8bd958481abb25a40
-
SHA256
33bcc5b1759b523a044b167f127f58a50a29e74c0333c4990dcc683c4e51e2b4
-
SHA512
6d748450ca294584bf173345a3f7b7b01e75dd0ea63f2fdb5868cf3097ec97b9d3db547f465cb9d68063e45eafcbe9eb49a8701a681c9ad253bfe121c3bf27a5
-
SSDEEP
12288:cAtdVSTQcXHGDl+oHyRbn6o3tAb81Xfn3NdlW0UZE:LSsGSl++I+oaA9dE
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1268 GuMtohhYgPAtIM.exe -
Loads dropped DLL 3 IoCs
pid Process 2392 cc3d39dea52b4f0f632cdaa84c37d1e4.exe 2392 cc3d39dea52b4f0f632cdaa84c37d1e4.exe 1268 GuMtohhYgPAtIM.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\GuMtohhYgPAtIM.exe = "C:\\ProgramData\\GuMtohhYgPAtIM.exe" cc3d39dea52b4f0f632cdaa84c37d1e4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Download cc3d39dea52b4f0f632cdaa84c37d1e4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" cc3d39dea52b4f0f632cdaa84c37d1e4.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2392 cc3d39dea52b4f0f632cdaa84c37d1e4.exe 2392 cc3d39dea52b4f0f632cdaa84c37d1e4.exe 1268 GuMtohhYgPAtIM.exe 1268 GuMtohhYgPAtIM.exe 1268 GuMtohhYgPAtIM.exe 1268 GuMtohhYgPAtIM.exe 1268 GuMtohhYgPAtIM.exe 1268 GuMtohhYgPAtIM.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2392 cc3d39dea52b4f0f632cdaa84c37d1e4.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1268 GuMtohhYgPAtIM.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1268 GuMtohhYgPAtIM.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1268 2392 cc3d39dea52b4f0f632cdaa84c37d1e4.exe 28 PID 2392 wrote to memory of 1268 2392 cc3d39dea52b4f0f632cdaa84c37d1e4.exe 28 PID 2392 wrote to memory of 1268 2392 cc3d39dea52b4f0f632cdaa84c37d1e4.exe 28 PID 2392 wrote to memory of 1268 2392 cc3d39dea52b4f0f632cdaa84c37d1e4.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cc3d39dea52b4f0f632cdaa84c37d1e4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" cc3d39dea52b4f0f632cdaa84c37d1e4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc3d39dea52b4f0f632cdaa84c37d1e4.exe"C:\Users\Admin\AppData\Local\Temp\cc3d39dea52b4f0f632cdaa84c37d1e4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2392 -
C:\ProgramData\GuMtohhYgPAtIM.exe"C:\ProgramData\GuMtohhYgPAtIM.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
464KB
MD5cc3d39dea52b4f0f632cdaa84c37d1e4
SHA10b818f49d765925b2763d9e8bd958481abb25a40
SHA25633bcc5b1759b523a044b167f127f58a50a29e74c0333c4990dcc683c4e51e2b4
SHA5126d748450ca294584bf173345a3f7b7b01e75dd0ea63f2fdb5868cf3097ec97b9d3db547f465cb9d68063e45eafcbe9eb49a8701a681c9ad253bfe121c3bf27a5
-
Filesize
425KB
MD5fb05d74bb42e8a6ecc8f89e19e298424
SHA1665bd8cd19e2a1700ec29966ffbc45c2399867ac
SHA2561f90b84eb931aec01b60028e0fcc3f51b0032f881086692f42c250d2986c7a18
SHA5122d17613f1f661598a2bf3a7642e9994a30a96778e10935e5e544207d90a4a0cf2e4cafacff544ab8af79730ab0659784f3e094501dfcf7bd6bde0563c82480b7