Here is my idea:
Under the symmetric key encryption. Alice and Bob share the symmetric key K. Let HASH be a secure hash function and Enc_k(message) be the encryption message m by AES in the CBC mode with a random IV
First, Alice compute c = Enc_k(message)
Second, Alice compute t = Hash(m)
Third, Alice sends (c, t) to Bob
Fourth, Bob receive (c, t), first verify if Hash(c) = t. If this is the case, Bob decrypts c using share K to output m.
Is this CCA secure? Why and why not? How can I improve this?