Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
05-04-2021 00:53
Static task
static1
Behavioral task
behavioral1
Sample
9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe
Resource
win10v20201028
General
-
Target
9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe
-
Size
269KB
-
MD5
ba28a06e2aae1052319541d4124122c5
-
SHA1
20613e49ee5b14dc04c7b045900f1d0e1b4173be
-
SHA256
9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46
-
SHA512
9aaaa26c106043d56c48f89b3dd7b84ba9bbf7951c5e82a622d0eb93169e9520643bd5cb6b49dbd1cce7f5cd776e6b62b855266c099304acd3b9faa703187f25
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
laihk.exelaihk.exepid process 1944 laihk.exe 1252 laihk.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Ozub\laihk.exe upx \Users\Admin\AppData\Roaming\Ozub\laihk.exe upx C:\Users\Admin\AppData\Roaming\Ozub\laihk.exe upx C:\Users\Admin\AppData\Roaming\Ozub\laihk.exe upx C:\Users\Admin\AppData\Roaming\Ozub\laihk.exe upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 396 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exepid process 1836 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe 1836 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
laihk.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\Currentversion\Run laihk.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\{FDC92E53-265E-DD44-AA83-95BE336542F4} = "C:\\Users\\Admin\\AppData\\Roaming\\Ozub\\laihk.exe" laihk.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exelaihk.exedescription pid process target process PID 1432 set thread context of 1836 1432 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe PID 1944 set thread context of 1252 1944 laihk.exe laihk.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
laihk.exepid process 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe 1252 laihk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exedescription pid process Token: SeSecurityPrivilege 1836 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe -
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exelaihk.exelaihk.exedescription pid process target process PID 1432 wrote to memory of 1836 1432 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe PID 1432 wrote to memory of 1836 1432 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe PID 1432 wrote to memory of 1836 1432 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe PID 1432 wrote to memory of 1836 1432 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe PID 1432 wrote to memory of 1836 1432 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe PID 1432 wrote to memory of 1836 1432 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe PID 1432 wrote to memory of 1836 1432 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe PID 1432 wrote to memory of 1836 1432 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe PID 1432 wrote to memory of 1836 1432 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe PID 1836 wrote to memory of 1944 1836 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe laihk.exe PID 1836 wrote to memory of 1944 1836 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe laihk.exe PID 1836 wrote to memory of 1944 1836 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe laihk.exe PID 1836 wrote to memory of 1944 1836 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe laihk.exe PID 1944 wrote to memory of 1252 1944 laihk.exe laihk.exe PID 1944 wrote to memory of 1252 1944 laihk.exe laihk.exe PID 1944 wrote to memory of 1252 1944 laihk.exe laihk.exe PID 1944 wrote to memory of 1252 1944 laihk.exe laihk.exe PID 1944 wrote to memory of 1252 1944 laihk.exe laihk.exe PID 1944 wrote to memory of 1252 1944 laihk.exe laihk.exe PID 1944 wrote to memory of 1252 1944 laihk.exe laihk.exe PID 1944 wrote to memory of 1252 1944 laihk.exe laihk.exe PID 1944 wrote to memory of 1252 1944 laihk.exe laihk.exe PID 1836 wrote to memory of 396 1836 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe cmd.exe PID 1836 wrote to memory of 396 1836 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe cmd.exe PID 1836 wrote to memory of 396 1836 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe cmd.exe PID 1836 wrote to memory of 396 1836 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe cmd.exe PID 1252 wrote to memory of 1140 1252 laihk.exe taskhost.exe PID 1252 wrote to memory of 1140 1252 laihk.exe taskhost.exe PID 1252 wrote to memory of 1140 1252 laihk.exe taskhost.exe PID 1252 wrote to memory of 1140 1252 laihk.exe taskhost.exe PID 1252 wrote to memory of 1140 1252 laihk.exe taskhost.exe PID 1252 wrote to memory of 1228 1252 laihk.exe Dwm.exe PID 1252 wrote to memory of 1228 1252 laihk.exe Dwm.exe PID 1252 wrote to memory of 1228 1252 laihk.exe Dwm.exe PID 1252 wrote to memory of 1228 1252 laihk.exe Dwm.exe PID 1252 wrote to memory of 1228 1252 laihk.exe Dwm.exe PID 1252 wrote to memory of 1260 1252 laihk.exe Explorer.EXE PID 1252 wrote to memory of 1260 1252 laihk.exe Explorer.EXE PID 1252 wrote to memory of 1260 1252 laihk.exe Explorer.EXE PID 1252 wrote to memory of 1260 1252 laihk.exe Explorer.EXE PID 1252 wrote to memory of 1260 1252 laihk.exe Explorer.EXE PID 1252 wrote to memory of 1836 1252 laihk.exe 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe PID 1252 wrote to memory of 1836 1252 laihk.exe 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe PID 1252 wrote to memory of 1836 1252 laihk.exe 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe PID 1252 wrote to memory of 1836 1252 laihk.exe 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe PID 1252 wrote to memory of 1836 1252 laihk.exe 9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe PID 1252 wrote to memory of 396 1252 laihk.exe cmd.exe PID 1252 wrote to memory of 396 1252 laihk.exe cmd.exe PID 1252 wrote to memory of 396 1252 laihk.exe cmd.exe PID 1252 wrote to memory of 396 1252 laihk.exe cmd.exe PID 1252 wrote to memory of 396 1252 laihk.exe cmd.exe PID 1252 wrote to memory of 580 1252 laihk.exe DllHost.exe PID 1252 wrote to memory of 580 1252 laihk.exe DllHost.exe PID 1252 wrote to memory of 580 1252 laihk.exe DllHost.exe PID 1252 wrote to memory of 580 1252 laihk.exe DllHost.exe PID 1252 wrote to memory of 580 1252 laihk.exe DllHost.exe PID 1252 wrote to memory of 1176 1252 laihk.exe DllHost.exe PID 1252 wrote to memory of 1176 1252 laihk.exe DllHost.exe PID 1252 wrote to memory of 1176 1252 laihk.exe DllHost.exe PID 1252 wrote to memory of 1176 1252 laihk.exe DllHost.exe PID 1252 wrote to memory of 1176 1252 laihk.exe DllHost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe"C:\Users\Admin\AppData\Local\Temp\9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exeC:\Users\Admin\AppData\Local\Temp\9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46.exe3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Ozub\laihk.exe"C:\Users\Admin\AppData\Roaming\Ozub\laihk.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Ozub\laihk.exeC:\Users\Admin\AppData\Roaming\Ozub\laihk.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp5bbc77d4.bat"4⤵
- Deletes itself
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp5bbc77d4.batMD5
39e9061cbfc98f18c43601810788fb22
SHA1f8d23bbcf0859d87c649bfd6565de911bc1b8786
SHA256b79e5d111742456ab8a386228c34ad74d5630a24d143f9ee3bccab2f4b4d2457
SHA51272f854db78a8a58404a1ed671cc294f8cc03632592006d42e8eebd2c5848cf0bd777cb625e944f5d0ad4ac6d5b9fe627d6659a6b7e6f577e943e0925c540f561
-
C:\Users\Admin\AppData\Roaming\Ozub\laihk.exeMD5
ca919ba4e8bfc88ab6328cfeb857b16e
SHA10717b627d384f8da5491901fadc366159685e342
SHA2569eb27353e8d8fa3f4c980e3461713921629172aef3aa14113b7d3528774f4db1
SHA512248973271cf3337718a46bb49b3461ae23a6866c7a121b007cdc958edb4d398b1fb51feebf9cff9be7a0e5e93c8e4adcf3192d6edd2ddd0832ed0f3dc953bec3
-
C:\Users\Admin\AppData\Roaming\Ozub\laihk.exeMD5
ca919ba4e8bfc88ab6328cfeb857b16e
SHA10717b627d384f8da5491901fadc366159685e342
SHA2569eb27353e8d8fa3f4c980e3461713921629172aef3aa14113b7d3528774f4db1
SHA512248973271cf3337718a46bb49b3461ae23a6866c7a121b007cdc958edb4d398b1fb51feebf9cff9be7a0e5e93c8e4adcf3192d6edd2ddd0832ed0f3dc953bec3
-
C:\Users\Admin\AppData\Roaming\Ozub\laihk.exeMD5
ca919ba4e8bfc88ab6328cfeb857b16e
SHA10717b627d384f8da5491901fadc366159685e342
SHA2569eb27353e8d8fa3f4c980e3461713921629172aef3aa14113b7d3528774f4db1
SHA512248973271cf3337718a46bb49b3461ae23a6866c7a121b007cdc958edb4d398b1fb51feebf9cff9be7a0e5e93c8e4adcf3192d6edd2ddd0832ed0f3dc953bec3
-
\Users\Admin\AppData\Roaming\Ozub\laihk.exeMD5
ca919ba4e8bfc88ab6328cfeb857b16e
SHA10717b627d384f8da5491901fadc366159685e342
SHA2569eb27353e8d8fa3f4c980e3461713921629172aef3aa14113b7d3528774f4db1
SHA512248973271cf3337718a46bb49b3461ae23a6866c7a121b007cdc958edb4d398b1fb51feebf9cff9be7a0e5e93c8e4adcf3192d6edd2ddd0832ed0f3dc953bec3
-
\Users\Admin\AppData\Roaming\Ozub\laihk.exeMD5
ca919ba4e8bfc88ab6328cfeb857b16e
SHA10717b627d384f8da5491901fadc366159685e342
SHA2569eb27353e8d8fa3f4c980e3461713921629172aef3aa14113b7d3528774f4db1
SHA512248973271cf3337718a46bb49b3461ae23a6866c7a121b007cdc958edb4d398b1fb51feebf9cff9be7a0e5e93c8e4adcf3192d6edd2ddd0832ed0f3dc953bec3
-
memory/396-17-0x0000000000000000-mapping.dmp
-
memory/396-19-0x00000000001D0000-0x00000000001F7000-memory.dmpFilesize
156KB
-
memory/1176-22-0x000007FEF74A0000-0x000007FEF771A000-memory.dmpFilesize
2.5MB
-
memory/1252-14-0x000000000041D522-mapping.dmp
-
memory/1432-2-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/1836-4-0x000000000041D522-mapping.dmp
-
memory/1836-6-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/1836-18-0x0000000002150000-0x0000000002177000-memory.dmpFilesize
156KB
-
memory/1836-5-0x0000000075BF1000-0x0000000075BF3000-memory.dmpFilesize
8KB
-
memory/1836-3-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/1944-11-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1944-9-0x0000000000000000-mapping.dmp