Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
cc3d39dea52b4f0f632cdaa84c37d1e4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cc3d39dea52b4f0f632cdaa84c37d1e4.exe
Resource
win10v2004-20240226-en
General
-
Target
cc3d39dea52b4f0f632cdaa84c37d1e4.exe
-
Size
464KB
-
MD5
cc3d39dea52b4f0f632cdaa84c37d1e4
-
SHA1
0b818f49d765925b2763d9e8bd958481abb25a40
-
SHA256
33bcc5b1759b523a044b167f127f58a50a29e74c0333c4990dcc683c4e51e2b4
-
SHA512
6d748450ca294584bf173345a3f7b7b01e75dd0ea63f2fdb5868cf3097ec97b9d3db547f465cb9d68063e45eafcbe9eb49a8701a681c9ad253bfe121c3bf27a5
-
SSDEEP
12288:cAtdVSTQcXHGDl+oHyRbn6o3tAb81Xfn3NdlW0UZE:LSsGSl++I+oaA9dE
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation cc3d39dea52b4f0f632cdaa84c37d1e4.exe -
Executes dropped EXE 1 IoCs
pid Process 956 GuMtohhYgPAtIM.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GuMtohhYgPAtIM.exe = "C:\\ProgramData\\GuMtohhYgPAtIM.exe" cc3d39dea52b4f0f632cdaa84c37d1e4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Internet Explorer\Download cc3d39dea52b4f0f632cdaa84c37d1e4.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" cc3d39dea52b4f0f632cdaa84c37d1e4.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1008 cc3d39dea52b4f0f632cdaa84c37d1e4.exe 1008 cc3d39dea52b4f0f632cdaa84c37d1e4.exe 1008 cc3d39dea52b4f0f632cdaa84c37d1e4.exe 1008 cc3d39dea52b4f0f632cdaa84c37d1e4.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe 956 GuMtohhYgPAtIM.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1008 cc3d39dea52b4f0f632cdaa84c37d1e4.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1008 wrote to memory of 956 1008 cc3d39dea52b4f0f632cdaa84c37d1e4.exe 88 PID 1008 wrote to memory of 956 1008 cc3d39dea52b4f0f632cdaa84c37d1e4.exe 88 PID 1008 wrote to memory of 956 1008 cc3d39dea52b4f0f632cdaa84c37d1e4.exe 88 PID 956 wrote to memory of 3424 956 GuMtohhYgPAtIM.exe 56 PID 956 wrote to memory of 3424 956 GuMtohhYgPAtIM.exe 56 PID 956 wrote to memory of 3424 956 GuMtohhYgPAtIM.exe 56 PID 956 wrote to memory of 3424 956 GuMtohhYgPAtIM.exe 56 PID 956 wrote to memory of 3424 956 GuMtohhYgPAtIM.exe 56 PID 956 wrote to memory of 3424 956 GuMtohhYgPAtIM.exe 56 PID 956 wrote to memory of 3424 956 GuMtohhYgPAtIM.exe 56 PID 956 wrote to memory of 3424 956 GuMtohhYgPAtIM.exe 56 PID 956 wrote to memory of 3424 956 GuMtohhYgPAtIM.exe 56 PID 956 wrote to memory of 3424 956 GuMtohhYgPAtIM.exe 56 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" cc3d39dea52b4f0f632cdaa84c37d1e4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cc3d39dea52b4f0f632cdaa84c37d1e4.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\cc3d39dea52b4f0f632cdaa84c37d1e4.exe"C:\Users\Admin\AppData\Local\Temp\cc3d39dea52b4f0f632cdaa84c37d1e4.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1008 -
C:\ProgramData\GuMtohhYgPAtIM.exe"C:\ProgramData\GuMtohhYgPAtIM.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425KB
MD5fb05d74bb42e8a6ecc8f89e19e298424
SHA1665bd8cd19e2a1700ec29966ffbc45c2399867ac
SHA2561f90b84eb931aec01b60028e0fcc3f51b0032f881086692f42c250d2986c7a18
SHA5122d17613f1f661598a2bf3a7642e9994a30a96778e10935e5e544207d90a4a0cf2e4cafacff544ab8af79730ab0659784f3e094501dfcf7bd6bde0563c82480b7
-
Filesize
464KB
MD5cc3d39dea52b4f0f632cdaa84c37d1e4
SHA10b818f49d765925b2763d9e8bd958481abb25a40
SHA25633bcc5b1759b523a044b167f127f58a50a29e74c0333c4990dcc683c4e51e2b4
SHA5126d748450ca294584bf173345a3f7b7b01e75dd0ea63f2fdb5868cf3097ec97b9d3db547f465cb9d68063e45eafcbe9eb49a8701a681c9ad253bfe121c3bf27a5