Analysis
-
max time kernel
361s -
max time network
363s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
Ocean-fI0H3L5M6.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Ocean-fI0H3L5M6.exe
Resource
win10v2004-20240802-en
General
-
Target
Ocean-fI0H3L5M6.exe
-
Size
2.3MB
-
MD5
c1789a41271b60738eac0e75e50301c5
-
SHA1
878947f22453e7b60c4d9e76459ee345e79da950
-
SHA256
6d259d23c285fa5fb619ac7e6a8cb3d4aa5f7cfdd85eb6910e93ae407783f1da
-
SHA512
6fa73c5e3832b95bc4c9fb3c547b956aa43ce370559cf07ac093a52764755df33b6ce6d978ad5f384daffb467ad03451dcda69c6b01f47e9382ea3ada2677014
-
SSDEEP
24576:XhLphtLzNPZlVOEvD9SYtSBzh0DkkaE64RyKMZyCV1E5/VGJnFLOX:XNtL99OEUtWDkG6MptMn8
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2244 tWzDle.exe -
Loads dropped DLL 1 IoCs
pid Process 2652 Ocean-fI0H3L5M6.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2244 tWzDle.exe 2244 tWzDle.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2244 tWzDle.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2652 Ocean-fI0H3L5M6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2244 2652 Ocean-fI0H3L5M6.exe 30 PID 2652 wrote to memory of 2244 2652 Ocean-fI0H3L5M6.exe 30 PID 2652 wrote to memory of 2244 2652 Ocean-fI0H3L5M6.exe 30 PID 2652 wrote to memory of 2576 2652 Ocean-fI0H3L5M6.exe 32 PID 2652 wrote to memory of 2576 2652 Ocean-fI0H3L5M6.exe 32 PID 2652 wrote to memory of 2576 2652 Ocean-fI0H3L5M6.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ocean-fI0H3L5M6.exe"C:\Users\Admin\AppData\Local\Temp\Ocean-fI0H3L5M6.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\l2VvLsVwG49\tWzDle.exeC:\Users\Admin\AppData\Local\Temp\l2VvLsVwG49\tWzDle.exe I0H3L5M62⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2652 -s 6362⤵PID:2576
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.5MB
MD57ce2377bbd24db6389f4bd72f68eb420
SHA11efba8a48ad9a615e851e98ca8b881e05d6e6cf3
SHA2567493d5a54f66c7d8ba8356b5c7c97a1358622c24c86e75ce39bc6e6c4226aa39
SHA512d253792f5aee9934377c47815111904a17d38de764ce1f991db09ddc832da1f71c38732443144eaf3a4524ea848ff49c5abbddfecc1f32ab95041514d5f199c2