Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 09:35
Static task
static1
Behavioral task
behavioral1
Sample
ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe
Resource
win10v2004-20240508-en
General
-
Target
ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe
-
Size
6.3MB
-
MD5
787842bce9203f00d5df89e588d61c31
-
SHA1
3c98800a143bc46c3349b7ce25e8dbe0e9fcce9a
-
SHA256
ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38
-
SHA512
e1a29df8a9000a893e95528acddc838245d8824d6f4ae00e64cb3e25f861b275fb91d9a2acc95ca86ca288e31d5d7801570cd5beef93e16765049ca2cc68488d
-
SSDEEP
98304:vWATqbvhK7kY/aBvyXuFm6SaYgtNBwLCDBvpqDb0H6eqyK0h4JBAUZLlXcw:vWjk7kgNaFt77qyK0yJVF
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows×ÊÔ´¹ÜÀíÆ÷.exe.lnk ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe -
Executes dropped EXE 3 IoCs
pid Process 3056 Windows×ÊÔ´¹ÜÀíÆ÷.exe 2512 Oeciekg.exe 2608 Oeciekg.exe -
Loads dropped DLL 3 IoCs
pid Process 2872 ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe 2872 ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe 2872 ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Fujkvq\Oeciekg.exe Windows×ÊÔ´¹ÜÀíÆ÷.exe File opened for modification C:\Program Files (x86)\Microsoft Fujkvq\Oeciekg.exe Windows×ÊÔ´¹ÜÀíÆ÷.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2872 ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2872 ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe 2872 ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe 3056 Windows×ÊÔ´¹ÜÀíÆ÷.exe 3056 Windows×ÊÔ´¹ÜÀíÆ÷.exe 2512 Oeciekg.exe 2512 Oeciekg.exe 2872 ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe 2608 Oeciekg.exe 2608 Oeciekg.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3056 2872 ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe 28 PID 2872 wrote to memory of 3056 2872 ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe 28 PID 2872 wrote to memory of 3056 2872 ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe 28 PID 2872 wrote to memory of 3056 2872 ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe 28 PID 2512 wrote to memory of 2608 2512 Oeciekg.exe 30 PID 2512 wrote to memory of 2608 2512 Oeciekg.exe 30 PID 2512 wrote to memory of 2608 2512 Oeciekg.exe 30 PID 2512 wrote to memory of 2608 2512 Oeciekg.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe"C:\Users\Admin\AppData\Local\Temp\ce13e6ef912e34b1336738929cca1230985b4948c229956b6a8e28c8f5ce1f38.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Roaming\data\Windows×ÊÔ´¹ÜÀíÆ÷.exeC:\Users\Admin\AppData\Roaming\data\Windows×ÊÔ´¹ÜÀíÆ÷.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
C:\Program Files (x86)\Microsoft Fujkvq\Oeciekg.exe"C:\Program Files (x86)\Microsoft Fujkvq\Oeciekg.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Microsoft Fujkvq\Oeciekg.exe"C:\Program Files (x86)\Microsoft Fujkvq\Oeciekg.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD571d864b6b132a9235400af39917131b3
SHA1b79d02acde8be0d57bedef9bd3edeab0a5a066f3
SHA256f4392ea35b8bafc5813b48055be473c4eceb72f11936a67a92cd9086efc2492e
SHA512f331a1c933e016667682d3339784e57f4518305954a7e02643b4deab5ff8ded663232f38190d535457f4351d506f642cea961ea09dc3182c7917f8e483dbd0d3
-
Filesize
2.5MB
MD5a45d8954cd672381107704643279e2b3
SHA1b2fe5c580d293a83d23012d325d9f559ebaefbec
SHA256f5aee374a8487ea15062efef5247e949ae50a14d4edb2cb38048b258d367cf50
SHA512b421902adbc5c745b0b19cecb0ce319371cce28a9cda9c650907fc8d38f348a2e42f21bd500e81cf83c16f43639986e4a61d8ac0742121da3b1a228bfe93615d