Analysis
-
max time kernel
13s -
max time network
15s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
05-05-2021 01:45
Static task
static1
Behavioral task
behavioral1
Sample
bac151b1d5d2ec80e8fbe53f8dede7f96215b6dc8e58098c1e69676d4a28dffd.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
bac151b1d5d2ec80e8fbe53f8dede7f96215b6dc8e58098c1e69676d4a28dffd.exe
Resource
win10v20210410
General
-
Target
bac151b1d5d2ec80e8fbe53f8dede7f96215b6dc8e58098c1e69676d4a28dffd.exe
-
Size
622KB
-
MD5
0de2e35c9d95fd78da164a7de78cfe16
-
SHA1
9634f27183ee0908b40792ba57fda820275150e2
-
SHA256
bac151b1d5d2ec80e8fbe53f8dede7f96215b6dc8e58098c1e69676d4a28dffd
-
SHA512
66ab2c75d15c42b2691974b37fa9464740ae51d06f555124b3ab1cb1b808f7f5740a991042a3532b646dab34f93855263545250c0280645518f0f7756015cd76
Malware Config
Signatures
-
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\CypsY.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\CypsY.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\CypsY.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\CypsY.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
CypsY.exepid process 1188 CypsY.exe -
Loads dropped DLL 2 IoCs
Processes:
bac151b1d5d2ec80e8fbe53f8dede7f96215b6dc8e58098c1e69676d4a28dffd.exepid process 1200 bac151b1d5d2ec80e8fbe53f8dede7f96215b6dc8e58098c1e69676d4a28dffd.exe 1200 bac151b1d5d2ec80e8fbe53f8dede7f96215b6dc8e58098c1e69676d4a28dffd.exe -
Drops file in Program Files directory 64 IoCs
Processes:
CypsY.exedescription ioc process File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe CypsY.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe CypsY.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe CypsY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE CypsY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE CypsY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe CypsY.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe CypsY.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe CypsY.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe CypsY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe CypsY.exe File opened for modification C:\Program Files (x86)\Google\Temp\GUME011.tmp\GoogleUpdateSetup.exe CypsY.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{406E5475-62F1-42AB-B6F4-D17073AF9034}\89.0.4389.114_chrome_installer.exe CypsY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe CypsY.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe CypsY.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe CypsY.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe CypsY.exe File opened for modification C:\Program Files\Windows Mail\wab.exe CypsY.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe CypsY.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe CypsY.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe CypsY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE CypsY.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe CypsY.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe CypsY.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe CypsY.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe CypsY.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe CypsY.exe File opened for modification C:\Program Files\7-Zip\7zG.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe CypsY.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe CypsY.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.35.452\GoogleUpdate.exe CypsY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE CypsY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe CypsY.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe CypsY.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe CypsY.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe CypsY.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe CypsY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe CypsY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE CypsY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE CypsY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe CypsY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
bac151b1d5d2ec80e8fbe53f8dede7f96215b6dc8e58098c1e69676d4a28dffd.exeCypsY.exedescription pid process target process PID 1200 wrote to memory of 1188 1200 bac151b1d5d2ec80e8fbe53f8dede7f96215b6dc8e58098c1e69676d4a28dffd.exe CypsY.exe PID 1200 wrote to memory of 1188 1200 bac151b1d5d2ec80e8fbe53f8dede7f96215b6dc8e58098c1e69676d4a28dffd.exe CypsY.exe PID 1200 wrote to memory of 1188 1200 bac151b1d5d2ec80e8fbe53f8dede7f96215b6dc8e58098c1e69676d4a28dffd.exe CypsY.exe PID 1200 wrote to memory of 1188 1200 bac151b1d5d2ec80e8fbe53f8dede7f96215b6dc8e58098c1e69676d4a28dffd.exe CypsY.exe PID 1188 wrote to memory of 360 1188 CypsY.exe cmd.exe PID 1188 wrote to memory of 360 1188 CypsY.exe cmd.exe PID 1188 wrote to memory of 360 1188 CypsY.exe cmd.exe PID 1188 wrote to memory of 360 1188 CypsY.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bac151b1d5d2ec80e8fbe53f8dede7f96215b6dc8e58098c1e69676d4a28dffd.exe"C:\Users\Admin\AppData\Local\Temp\bac151b1d5d2ec80e8fbe53f8dede7f96215b6dc8e58098c1e69676d4a28dffd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CypsY.exeC:\Users\Admin\AppData\Local\Temp\CypsY.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\36422d85.bat" "3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\36422d85.batMD5
897ef325f6d3acbbda9a48dff7f31549
SHA1fd36b0f82a5b415c058eef5b5de7b6a5026c5f13
SHA2560174addfcc6974802b8aece2aa1861854eee4d9c61d2503a3625dcc1841ec80e
SHA512349461b26fa5a4a85a18baaee958179b3050e02a6136566ceacf855d254a03e9b1a53f5284516e222bed9273592c26b73f6e67fea0bf74603b39dc0714ad8f80
-
C:\Users\Admin\AppData\Local\Temp\CypsY.exeMD5
56b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
C:\Users\Admin\AppData\Local\Temp\CypsY.exeMD5
56b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
\Users\Admin\AppData\Local\Temp\CypsY.exeMD5
56b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
\Users\Admin\AppData\Local\Temp\CypsY.exeMD5
56b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
memory/360-66-0x0000000000000000-mapping.dmp
-
memory/1188-62-0x0000000000000000-mapping.dmp
-
memory/1188-64-0x00000000768B1000-0x00000000768B3000-memory.dmpFilesize
8KB