Overview
overview
10Static
static
10lab_02_win...5b.exe
windows7_x64
8lab_02_win...5b.exe
windows10_x64
8lab_02_win...82.exe
windows7_x64
8lab_02_win...82.exe
windows10_x64
8lab_02_win...63.exe
windows7_x64
10lab_02_win...63.exe
windows10_x64
10lab_02_win...15.exe
windows7_x64
8lab_02_win...15.exe
windows10_x64
8lab_02_win...c7.exe
windows7_x64
8lab_02_win...c7.exe
windows10_x64
8Analysis
-
max time kernel
300s -
max time network
154s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
25-06-2021 09:58
Behavioral task
behavioral1
Sample
lab_02_win10x64/1e3966e77ad1cbf3e3ef76803fbf92300b2b88af39650a1208520e0cdc05645b.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
lab_02_win10x64/1e3966e77ad1cbf3e3ef76803fbf92300b2b88af39650a1208520e0cdc05645b.exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
lab_02_win10x64/6562e2ac60afa314cd463f771fcfb8be70f947f6e2b314b0c48187eebb33dd82.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
lab_02_win10x64/6562e2ac60afa314cd463f771fcfb8be70f947f6e2b314b0c48187eebb33dd82.exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
lab_02_win10x64/6d34ded00c0da9887ba752872093f59c649de72a1f629a32014f5ed8be509363.exe
Resource
win7v20210408
Behavioral task
behavioral6
Sample
lab_02_win10x64/6d34ded00c0da9887ba752872093f59c649de72a1f629a32014f5ed8be509363.exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
lab_02_win10x64/a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
Resource
win7v20210408
Behavioral task
behavioral8
Sample
lab_02_win10x64/a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
lab_02_win10x64/b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7.exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
lab_02_win10x64/b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7.exe
Resource
win10v20210408
General
-
Target
lab_02_win10x64/a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
atycd.exeatycd.exepid process 1656 atycd.exe 764 atycd.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 584 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exepid process 840 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 840 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
atycd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\Currentversion\Run atycd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\Currentversion\Run atycd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Eravyce = "C:\\Users\\Admin\\AppData\\Roaming\\Zapate\\atycd.exe" atycd.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exeatycd.exedescription pid process target process PID 1796 set thread context of 840 1796 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 1656 set thread context of 764 1656 atycd.exe atycd.exe -
Processes:
a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Privacy a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
atycd.exepid process 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe 764 atycd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exedescription pid process Token: SeSecurityPrivilege 840 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe Token: SeSecurityPrivilege 840 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exeatycd.exepid process 1796 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 1656 atycd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exea380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exeatycd.exeatycd.exedescription pid process target process PID 1796 wrote to memory of 840 1796 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 1796 wrote to memory of 840 1796 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 1796 wrote to memory of 840 1796 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 1796 wrote to memory of 840 1796 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 1796 wrote to memory of 840 1796 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 1796 wrote to memory of 840 1796 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 1796 wrote to memory of 840 1796 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 1796 wrote to memory of 840 1796 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 1796 wrote to memory of 840 1796 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 1796 wrote to memory of 840 1796 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 840 wrote to memory of 1656 840 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe atycd.exe PID 840 wrote to memory of 1656 840 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe atycd.exe PID 840 wrote to memory of 1656 840 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe atycd.exe PID 840 wrote to memory of 1656 840 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe atycd.exe PID 1656 wrote to memory of 764 1656 atycd.exe atycd.exe PID 1656 wrote to memory of 764 1656 atycd.exe atycd.exe PID 1656 wrote to memory of 764 1656 atycd.exe atycd.exe PID 1656 wrote to memory of 764 1656 atycd.exe atycd.exe PID 1656 wrote to memory of 764 1656 atycd.exe atycd.exe PID 1656 wrote to memory of 764 1656 atycd.exe atycd.exe PID 1656 wrote to memory of 764 1656 atycd.exe atycd.exe PID 1656 wrote to memory of 764 1656 atycd.exe atycd.exe PID 1656 wrote to memory of 764 1656 atycd.exe atycd.exe PID 1656 wrote to memory of 764 1656 atycd.exe atycd.exe PID 764 wrote to memory of 1116 764 atycd.exe taskhost.exe PID 764 wrote to memory of 1116 764 atycd.exe taskhost.exe PID 764 wrote to memory of 1116 764 atycd.exe taskhost.exe PID 764 wrote to memory of 1116 764 atycd.exe taskhost.exe PID 764 wrote to memory of 1116 764 atycd.exe taskhost.exe PID 764 wrote to memory of 1176 764 atycd.exe Dwm.exe PID 764 wrote to memory of 1176 764 atycd.exe Dwm.exe PID 764 wrote to memory of 1176 764 atycd.exe Dwm.exe PID 764 wrote to memory of 1176 764 atycd.exe Dwm.exe PID 764 wrote to memory of 1176 764 atycd.exe Dwm.exe PID 764 wrote to memory of 1208 764 atycd.exe Explorer.EXE PID 764 wrote to memory of 1208 764 atycd.exe Explorer.EXE PID 764 wrote to memory of 1208 764 atycd.exe Explorer.EXE PID 764 wrote to memory of 1208 764 atycd.exe Explorer.EXE PID 764 wrote to memory of 1208 764 atycd.exe Explorer.EXE PID 764 wrote to memory of 840 764 atycd.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 764 wrote to memory of 840 764 atycd.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 764 wrote to memory of 840 764 atycd.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 764 wrote to memory of 840 764 atycd.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 764 wrote to memory of 840 764 atycd.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 840 wrote to memory of 584 840 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe cmd.exe PID 840 wrote to memory of 584 840 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe cmd.exe PID 840 wrote to memory of 584 840 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe cmd.exe PID 840 wrote to memory of 584 840 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe cmd.exe PID 764 wrote to memory of 584 764 atycd.exe cmd.exe PID 764 wrote to memory of 584 764 atycd.exe cmd.exe PID 764 wrote to memory of 584 764 atycd.exe cmd.exe PID 764 wrote to memory of 584 764 atycd.exe cmd.exe PID 764 wrote to memory of 584 764 atycd.exe cmd.exe PID 764 wrote to memory of 1768 764 atycd.exe DllHost.exe PID 764 wrote to memory of 1768 764 atycd.exe DllHost.exe PID 764 wrote to memory of 1768 764 atycd.exe DllHost.exe PID 764 wrote to memory of 1768 764 atycd.exe DllHost.exe PID 764 wrote to memory of 1768 764 atycd.exe DllHost.exe PID 764 wrote to memory of 1732 764 atycd.exe DllHost.exe PID 764 wrote to memory of 1732 764 atycd.exe DllHost.exe PID 764 wrote to memory of 1732 764 atycd.exe DllHost.exe PID 764 wrote to memory of 1732 764 atycd.exe DllHost.exe PID 764 wrote to memory of 1732 764 atycd.exe DllHost.exe PID 764 wrote to memory of 1536 764 atycd.exe DllHost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Zapate\atycd.exe"C:\Users\Admin\AppData\Roaming\Zapate\atycd.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Zapate\atycd.exe"C:\Users\Admin\AppData\Roaming\Zapate\atycd.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa38ead2b.bat"4⤵
- Deletes itself
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpa38ead2b.batMD5
347db784a93ab1cd0951579a1cae24fd
SHA115a3bceef41dcb6113ff495ae634ffd0d1da775e
SHA2565adbff3b3d9e8e6ded8f814ed5d37d3d9cb813def6e63295292c7c2273b1f8ae
SHA512d7abd6a96cc0017cd8864156e6252e229352cc1fd1e7c01cd04115dfb91486f78b64b24e37e88cbfcfa16df978f52aba24d6c185266966f7f027cb95da354621
-
C:\Users\Admin\AppData\Roaming\Zapate\atycd.exeMD5
bb1a9aa63cc1852695f505da38ba513c
SHA1e28dba2e3c6b3a7472f599c41116a682b6166165
SHA256e696ac60f5059ab7edefec4bfd9c870804b0460de92ad8caaab2a00ecbc2e619
SHA512593b520abc5a58912993b426fb2b9fffd39e1151a97971c079fe5ca5c6c007c7e0cfb566fbd0d15c4636af2a1ca18436d2137d201455abdee64b81d4fc471ab6
-
C:\Users\Admin\AppData\Roaming\Zapate\atycd.exeMD5
bb1a9aa63cc1852695f505da38ba513c
SHA1e28dba2e3c6b3a7472f599c41116a682b6166165
SHA256e696ac60f5059ab7edefec4bfd9c870804b0460de92ad8caaab2a00ecbc2e619
SHA512593b520abc5a58912993b426fb2b9fffd39e1151a97971c079fe5ca5c6c007c7e0cfb566fbd0d15c4636af2a1ca18436d2137d201455abdee64b81d4fc471ab6
-
C:\Users\Admin\AppData\Roaming\Zapate\atycd.exeMD5
bb1a9aa63cc1852695f505da38ba513c
SHA1e28dba2e3c6b3a7472f599c41116a682b6166165
SHA256e696ac60f5059ab7edefec4bfd9c870804b0460de92ad8caaab2a00ecbc2e619
SHA512593b520abc5a58912993b426fb2b9fffd39e1151a97971c079fe5ca5c6c007c7e0cfb566fbd0d15c4636af2a1ca18436d2137d201455abdee64b81d4fc471ab6
-
\Users\Admin\AppData\Roaming\Zapate\atycd.exeMD5
bb1a9aa63cc1852695f505da38ba513c
SHA1e28dba2e3c6b3a7472f599c41116a682b6166165
SHA256e696ac60f5059ab7edefec4bfd9c870804b0460de92ad8caaab2a00ecbc2e619
SHA512593b520abc5a58912993b426fb2b9fffd39e1151a97971c079fe5ca5c6c007c7e0cfb566fbd0d15c4636af2a1ca18436d2137d201455abdee64b81d4fc471ab6
-
\Users\Admin\AppData\Roaming\Zapate\atycd.exeMD5
bb1a9aa63cc1852695f505da38ba513c
SHA1e28dba2e3c6b3a7472f599c41116a682b6166165
SHA256e696ac60f5059ab7edefec4bfd9c870804b0460de92ad8caaab2a00ecbc2e619
SHA512593b520abc5a58912993b426fb2b9fffd39e1151a97971c079fe5ca5c6c007c7e0cfb566fbd0d15c4636af2a1ca18436d2137d201455abdee64b81d4fc471ab6
-
memory/584-80-0x0000000000000000-mapping.dmp
-
memory/764-77-0x000000000042B055-mapping.dmp
-
memory/840-66-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/840-64-0x000000000042B055-mapping.dmp
-
memory/840-63-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/840-83-0x0000000000440000-0x000000000048F000-memory.dmpFilesize
316KB
-
memory/840-84-0x00000000004C0000-0x00000000004C1000-memory.dmpFilesize
4KB
-
memory/1656-69-0x0000000000000000-mapping.dmp
-
memory/1796-61-0x0000000000280000-0x00000000002A0000-memory.dmpFilesize
128KB
-
memory/1796-62-0x0000000076641000-0x0000000076643000-memory.dmpFilesize
8KB