Analysis
-
max time kernel
71s -
max time network
146s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
28-09-2020 06:18
Static task
static1
Behavioral task
behavioral1
Sample
ezmvVCJt.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
ezmvVCJt.exe
Resource
win10v200722
General
-
Target
ezmvVCJt.exe
-
Size
276KB
-
MD5
0ee2f7d6a851faf44bf235186be91a19
-
SHA1
83ebbf632e25dbe69b060d190a42a5125ffe3902
-
SHA256
b64c40843b011d715c431b761680e8565383ac702f5ed80492fb30bd6aa33929
-
SHA512
4450f9169419cd502df259bd32c9e37a793db17d731d206e71ff61065cb0277917874bb7196672e6e5cab0d7ee1ee1103b018ae5e2e0ac917ecfd807db18368a
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 20 IoCs
Processes:
server.exeserver.exeezmvVCJt.exeexplorer.exeserver.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\SysWOW64\\install\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ezmvVCJt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" ezmvVCJt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\SysWOW64\\install\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ezmvVCJt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\install\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\install\\server.exe" server.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\SysWOW64\\install\\server.exe" server.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\SysWOW64\\install\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" ezmvVCJt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe -
Executes dropped EXE 5 IoCs
Processes:
server.exeserver.exeserver.exeserver.exeserver.exepid process 2952 server.exe 1072 server.exe 3824 server.exe 3776 server.exe 1588 server.exe -
Modifies Installed Components in the registry 2 TTPs
-
Processes:
resource yara_rule behavioral2/memory/732-0-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/3920-78-0x0000000024080000-0x00000000240E2000-memory.dmp upx C:\Windows\SysWOW64\install\server.exe upx C:\Windows\SysWOW64\install\server.exe upx C:\Windows\SysWOW64\install\server.exe upx C:\Users\Admin\AppData\Roaming\install\server.exe upx C:\Windows\SysWOW64\install\server.exe upx C:\Windows\SysWOW64\install\server.exe upx C:\Windows\SysWOW64\install\server.exe upx behavioral2/memory/2080-238-0x0000000024160000-0x00000000241C2000-memory.dmp upx -
Drops file in System32 directory 8 IoCs
Processes:
server.exeezmvVCJt.exeserver.exeserver.exedescription ioc process File opened for modification C:\Windows\SysWOW64\install\server.exe server.exe File created C:\Windows\SysWOW64\install\server.exe server.exe File created C:\Windows\SysWOW64\install\server.exe ezmvVCJt.exe File opened for modification C:\Windows\SysWOW64\install\server.exe ezmvVCJt.exe File opened for modification C:\Windows\SysWOW64\install\server.exe server.exe File created C:\Windows\SysWOW64\install\server.exe server.exe File opened for modification C:\Windows\SysWOW64\install\server.exe server.exe File created C:\Windows\SysWOW64\install\server.exe server.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
ezmvVCJt.exeserver.exeserver.exeserver.exepid process 732 ezmvVCJt.exe 732 ezmvVCJt.exe 2952 server.exe 2952 server.exe 1072 server.exe 1072 server.exe 1588 server.exe 1588 server.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
ezmvVCJt.exepid process 732 ezmvVCJt.exe -
Suspicious use of WriteProcessMemory 946 IoCs
Processes:
ezmvVCJt.exedescription pid process target process PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE PID 732 wrote to memory of 2968 732 ezmvVCJt.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\ezmvVCJt.exe"C:\Users\Admin\AppData\Local\Temp\ezmvVCJt.exe"2⤵
- Adds policy Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Adds policy Run key to start application
PID:3920 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:3332
-
-
C:\Windows\SysWOW64\install\server.exe"C:\Windows\SysWOW64\install\server.exe"5⤵
- Executes dropped EXE
PID:3824
-
-
-
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1072 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1576
-
-
C:\Windows\SysWOW64\install\server.exe"C:\Windows\SysWOW64\install\server.exe"5⤵
- Executes dropped EXE
PID:3776
-
-
-
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\ezmvVCJt.exe"C:\Users\Admin\AppData\Local\Temp\ezmvVCJt.exe"3⤵PID:2080
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
29b6760eef1d20129c0d6acc40debe58
SHA1d86a470b9bead900ce444fd6b2a21d2616659d4b
SHA2560b921f97b45f298e80e824256af4a1f51955af281ceb4e9a9a241692106672c3
SHA51286744029ebc904385da8bcc8409e4bcb1d3055b049e1525b8bbefafd8b998fba767c50aa11665ef4e768bc5b3b8c2d5c53262aac68290a1371b277d3194913db
-
MD5
29b6760eef1d20129c0d6acc40debe58
SHA1d86a470b9bead900ce444fd6b2a21d2616659d4b
SHA2560b921f97b45f298e80e824256af4a1f51955af281ceb4e9a9a241692106672c3
SHA51286744029ebc904385da8bcc8409e4bcb1d3055b049e1525b8bbefafd8b998fba767c50aa11665ef4e768bc5b3b8c2d5c53262aac68290a1371b277d3194913db
-
MD5
eb1d6b8ed9e5e52ca66e8c42fffceb3b
SHA158c8a88b46f06272d164c16c54c251b506da9c6f
SHA256522a33d3491671409a571f49524c48679e256b7dff7039f0c524466567008ea9
SHA512d573eab790ce19432cb9ab4b146d5c3b62ad877015032e24f1cb3b651f3891aa66d44536cf2db674f8797610b71442b55935d0af415ffc65e160cca6cf940a7c
-
MD5
0ee2f7d6a851faf44bf235186be91a19
SHA183ebbf632e25dbe69b060d190a42a5125ffe3902
SHA256b64c40843b011d715c431b761680e8565383ac702f5ed80492fb30bd6aa33929
SHA5124450f9169419cd502df259bd32c9e37a793db17d731d206e71ff61065cb0277917874bb7196672e6e5cab0d7ee1ee1103b018ae5e2e0ac917ecfd807db18368a
-
MD5
0ee2f7d6a851faf44bf235186be91a19
SHA183ebbf632e25dbe69b060d190a42a5125ffe3902
SHA256b64c40843b011d715c431b761680e8565383ac702f5ed80492fb30bd6aa33929
SHA5124450f9169419cd502df259bd32c9e37a793db17d731d206e71ff61065cb0277917874bb7196672e6e5cab0d7ee1ee1103b018ae5e2e0ac917ecfd807db18368a
-
MD5
0ee2f7d6a851faf44bf235186be91a19
SHA183ebbf632e25dbe69b060d190a42a5125ffe3902
SHA256b64c40843b011d715c431b761680e8565383ac702f5ed80492fb30bd6aa33929
SHA5124450f9169419cd502df259bd32c9e37a793db17d731d206e71ff61065cb0277917874bb7196672e6e5cab0d7ee1ee1103b018ae5e2e0ac917ecfd807db18368a
-
MD5
0ee2f7d6a851faf44bf235186be91a19
SHA183ebbf632e25dbe69b060d190a42a5125ffe3902
SHA256b64c40843b011d715c431b761680e8565383ac702f5ed80492fb30bd6aa33929
SHA5124450f9169419cd502df259bd32c9e37a793db17d731d206e71ff61065cb0277917874bb7196672e6e5cab0d7ee1ee1103b018ae5e2e0ac917ecfd807db18368a
-
MD5
0ee2f7d6a851faf44bf235186be91a19
SHA183ebbf632e25dbe69b060d190a42a5125ffe3902
SHA256b64c40843b011d715c431b761680e8565383ac702f5ed80492fb30bd6aa33929
SHA5124450f9169419cd502df259bd32c9e37a793db17d731d206e71ff61065cb0277917874bb7196672e6e5cab0d7ee1ee1103b018ae5e2e0ac917ecfd807db18368a
-
MD5
0ee2f7d6a851faf44bf235186be91a19
SHA183ebbf632e25dbe69b060d190a42a5125ffe3902
SHA256b64c40843b011d715c431b761680e8565383ac702f5ed80492fb30bd6aa33929
SHA5124450f9169419cd502df259bd32c9e37a793db17d731d206e71ff61065cb0277917874bb7196672e6e5cab0d7ee1ee1103b018ae5e2e0ac917ecfd807db18368a
-
MD5
0ee2f7d6a851faf44bf235186be91a19
SHA183ebbf632e25dbe69b060d190a42a5125ffe3902
SHA256b64c40843b011d715c431b761680e8565383ac702f5ed80492fb30bd6aa33929
SHA5124450f9169419cd502df259bd32c9e37a793db17d731d206e71ff61065cb0277917874bb7196672e6e5cab0d7ee1ee1103b018ae5e2e0ac917ecfd807db18368a