Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe
Resource
win7-20240221-en
General
-
Target
cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe
-
Size
138KB
-
MD5
8eeb67bf53783881ad1762faf744002b
-
SHA1
25e5d02c9c8baf8088c3d4bd2c747b48ab6d7112
-
SHA256
cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d
-
SHA512
b784f0e44ed2931dc58401e94f03c70fffc831c138c41afb69ca9a42723266e970b0981d1a718a0d995dfcb3765932aa85d9ca0fad3aa4cc4637da3d19a4adaf
-
SSDEEP
1536:rC2/fYuPfbESFYXRWhpKRycRd57JkIqFHhzm4hWru/BzihhMN45MF5FvHP132xP8:r7YubEwYXRWhpAJUHhzm4hUukS6KmecW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1592 smss.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4276 sc.exe 4404 sc.exe 2412 sc.exe 3788 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4028 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 1592 smss.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4028 wrote to memory of 4276 4028 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 81 PID 4028 wrote to memory of 4276 4028 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 81 PID 4028 wrote to memory of 4276 4028 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 81 PID 4028 wrote to memory of 4404 4028 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 83 PID 4028 wrote to memory of 4404 4028 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 83 PID 4028 wrote to memory of 4404 4028 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 83 PID 4028 wrote to memory of 1592 4028 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 85 PID 4028 wrote to memory of 1592 4028 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 85 PID 4028 wrote to memory of 1592 4028 cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe 85 PID 1592 wrote to memory of 2412 1592 smss.exe 86 PID 1592 wrote to memory of 2412 1592 smss.exe 86 PID 1592 wrote to memory of 2412 1592 smss.exe 86 PID 1592 wrote to memory of 3788 1592 smss.exe 88 PID 1592 wrote to memory of 3788 1592 smss.exe 88 PID 1592 wrote to memory of 3788 1592 smss.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe"C:\Users\Admin\AppData\Local\Temp\cceeba4ccd6e9f66d4ab9e84d141c368ace57298e877da0b11b087cb20634f3d.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess2⤵
- Launches sc.exe
PID:4276
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:4404
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess3⤵
- Launches sc.exe
PID:2412
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:3788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD5de98c634a552b6ee10cd0ce0ec24c13e
SHA16eca15a0da0ceb7d1ecb000c74540d05c781ee96
SHA25668a3afb1e30e1e1a68fafaabf414f1365c612676a556ab99ddf4c09059b9c5f2
SHA51262416048308e5fbacf94e9fa99b4f01e5a9a2f01ba59229c53f1a4e30c6d9b534cd1bd6e1f0f7e6319eb4bc3767ec120263764b5f1267e9969fe54676c89df9c