Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 01:07
Behavioral task
behavioral1
Sample
ccb82058f63fb0a76cd68dadf15e4bb5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ccb82058f63fb0a76cd68dadf15e4bb5.exe
Resource
win10v2004-20240226-en
General
-
Target
ccb82058f63fb0a76cd68dadf15e4bb5.exe
-
Size
43KB
-
MD5
ccb82058f63fb0a76cd68dadf15e4bb5
-
SHA1
3717217442ce87963af94a362b7d4a148bf53e35
-
SHA256
c6e98708175951005dbe0def6e390e6a59d9d8c67ea7623ed7a6299345153c25
-
SHA512
a8386398144436cc261438362a001d72fd20baf9ba2618f79955fea925bde53658bd086b24cda10f313a6a156169628d5e82c6ff15051b2aa99ea617e4ea65ca
-
SSDEEP
768:euYpUwVG/vHNLyty5ynFzbjivumZurBweqSXH/S+WkDlUL342LI72U56wt:1xyc5QyR4mL+dDlaI2kSUzt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2224 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 Svchosts.exe -
resource yara_rule behavioral1/memory/2184-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/files/0x000e00000001225e-8.dat upx behavioral1/memory/2192-9-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2184-17-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2192-19-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2192-20-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2192-21-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2192-22-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2192-23-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2192-24-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2192-25-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2192-26-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2192-27-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2192-28-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2192-29-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2192-30-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2192-31-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2192-32-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\Svchosts.exe = "Svchosts.exe" ccb82058f63fb0a76cd68dadf15e4bb5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\Svchosts.exe = "Svchosts.exe" Svchosts.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Svchosts.exe ccb82058f63fb0a76cd68dadf15e4bb5.exe File opened for modification C:\Windows\Svchosts.exe ccb82058f63fb0a76cd68dadf15e4bb5.exe File created C:\Windows\Deleteme.bat ccb82058f63fb0a76cd68dadf15e4bb5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2184 ccb82058f63fb0a76cd68dadf15e4bb5.exe 2184 ccb82058f63fb0a76cd68dadf15e4bb5.exe 2184 ccb82058f63fb0a76cd68dadf15e4bb5.exe 2184 ccb82058f63fb0a76cd68dadf15e4bb5.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe 2192 Svchosts.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2192 2184 ccb82058f63fb0a76cd68dadf15e4bb5.exe 28 PID 2184 wrote to memory of 2192 2184 ccb82058f63fb0a76cd68dadf15e4bb5.exe 28 PID 2184 wrote to memory of 2192 2184 ccb82058f63fb0a76cd68dadf15e4bb5.exe 28 PID 2184 wrote to memory of 2192 2184 ccb82058f63fb0a76cd68dadf15e4bb5.exe 28 PID 2184 wrote to memory of 2224 2184 ccb82058f63fb0a76cd68dadf15e4bb5.exe 29 PID 2184 wrote to memory of 2224 2184 ccb82058f63fb0a76cd68dadf15e4bb5.exe 29 PID 2184 wrote to memory of 2224 2184 ccb82058f63fb0a76cd68dadf15e4bb5.exe 29 PID 2184 wrote to memory of 2224 2184 ccb82058f63fb0a76cd68dadf15e4bb5.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccb82058f63fb0a76cd68dadf15e4bb5.exe"C:\Users\Admin\AppData\Local\Temp\ccb82058f63fb0a76cd68dadf15e4bb5.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\Svchosts.exeC:\Windows\Svchosts.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Deleteme.bat2⤵
- Deletes itself
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5e1371a681afc8100d257ae6ed80d0fa9
SHA12d6f2e7a66ca7c03bc299b0af353f0d84300fa5f
SHA2563a5cab8e2a2394038be4a8c877fda78dd25f8dd3a06c8f3166b9786ed1fd4bb0
SHA5120f07eae24099d2d1525e12830a4f6df9c4868190fe0e88ed9a6a5c7c5a3b50be28fbaba6544a431932cdb0dbad22087ee79e3ec2e94faa5f093dc4db66dba116
-
Filesize
43KB
MD5ccb82058f63fb0a76cd68dadf15e4bb5
SHA13717217442ce87963af94a362b7d4a148bf53e35
SHA256c6e98708175951005dbe0def6e390e6a59d9d8c67ea7623ed7a6299345153c25
SHA512a8386398144436cc261438362a001d72fd20baf9ba2618f79955fea925bde53658bd086b24cda10f313a6a156169628d5e82c6ff15051b2aa99ea617e4ea65ca