Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe
Resource
win7-20240221-en
General
-
Target
cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe
-
Size
138KB
-
MD5
8eeb67bf53783881ad1762faf744002b
-
SHA1
25e5d02c9c8baf8088c3d4bd2c747b48ab6d7112
-
SHA256
cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d
-
SHA512
b784f0e44ed2931dc58401e94f03c70fffc831c138c41afb69ca9a42723266e970b0981d1a718a0d995dfcb3765932aa85d9ca0fad3aa4cc4637da3d19a4adaf
-
SSDEEP
1536:rC2/fYuPfbESFYXRWhpKRycRd57JkIqFHhzm4hWru/BzihhMN45MF5FvHP132xP8:r7YubEwYXRWhpAJUHhzm4hUukS6KmecW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2620 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 2972 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 2972 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2828 sc.exe 2812 sc.exe 3060 sc.exe 2568 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2972 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 2620 smss.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2812 2972 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 28 PID 2972 wrote to memory of 2812 2972 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 28 PID 2972 wrote to memory of 2812 2972 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 28 PID 2972 wrote to memory of 2812 2972 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 28 PID 2972 wrote to memory of 3060 2972 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 30 PID 2972 wrote to memory of 3060 2972 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 30 PID 2972 wrote to memory of 3060 2972 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 30 PID 2972 wrote to memory of 3060 2972 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 30 PID 2972 wrote to memory of 2620 2972 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 32 PID 2972 wrote to memory of 2620 2972 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 32 PID 2972 wrote to memory of 2620 2972 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 32 PID 2972 wrote to memory of 2620 2972 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 32 PID 2620 wrote to memory of 2568 2620 smss.exe 33 PID 2620 wrote to memory of 2568 2620 smss.exe 33 PID 2620 wrote to memory of 2568 2620 smss.exe 33 PID 2620 wrote to memory of 2568 2620 smss.exe 33 PID 2620 wrote to memory of 2828 2620 smss.exe 35 PID 2620 wrote to memory of 2828 2620 smss.exe 35 PID 2620 wrote to memory of 2828 2620 smss.exe 35 PID 2620 wrote to memory of 2828 2620 smss.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe"C:\Users\Admin\AppData\Local\Temp\cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess2⤵
- Launches sc.exe
PID:2812
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:3060
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess3⤵
- Launches sc.exe
PID:2568
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD586ede49fdce0d9a9db64ed247816884c
SHA1e279ed20aebfaec96d281a8e2907b3953f0e9faa
SHA25635bde2ba9cbe9fad4ec83128910773fa0faab2c221ace95e1b37ae05f0266ae8
SHA512fba9b88fd286f84d689760d7443afea77da4e0118e45086ca54192dd4738cf778ac960ecd64191e8fcbacd27a18b42b5ade55cef36d355cc8d57efee22e7752a