Overview
overview
10Static
static
10lab_02_win...5b.exe
windows7_x64
8lab_02_win...5b.exe
windows10_x64
8lab_02_win...82.exe
windows7_x64
8lab_02_win...82.exe
windows10_x64
8lab_02_win...63.exe
windows7_x64
10lab_02_win...63.exe
windows10_x64
10lab_02_win...15.exe
windows7_x64
8lab_02_win...15.exe
windows10_x64
8lab_02_win...c7.exe
windows7_x64
8lab_02_win...c7.exe
windows10_x64
8Analysis
-
max time kernel
300s -
max time network
272s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
25-06-2021 09:58
Behavioral task
behavioral1
Sample
lab_02_win10x64/1e3966e77ad1cbf3e3ef76803fbf92300b2b88af39650a1208520e0cdc05645b.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
lab_02_win10x64/1e3966e77ad1cbf3e3ef76803fbf92300b2b88af39650a1208520e0cdc05645b.exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
lab_02_win10x64/6562e2ac60afa314cd463f771fcfb8be70f947f6e2b314b0c48187eebb33dd82.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
lab_02_win10x64/6562e2ac60afa314cd463f771fcfb8be70f947f6e2b314b0c48187eebb33dd82.exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
lab_02_win10x64/6d34ded00c0da9887ba752872093f59c649de72a1f629a32014f5ed8be509363.exe
Resource
win7v20210408
Behavioral task
behavioral6
Sample
lab_02_win10x64/6d34ded00c0da9887ba752872093f59c649de72a1f629a32014f5ed8be509363.exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
lab_02_win10x64/a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
Resource
win7v20210408
Behavioral task
behavioral8
Sample
lab_02_win10x64/a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
lab_02_win10x64/b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7.exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
lab_02_win10x64/b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7.exe
Resource
win10v20210408
General
-
Target
lab_02_win10x64/a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
kubyo.exekubyo.exepid process 2264 kubyo.exe 1900 kubyo.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
kubyo.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\Currentversion\Run kubyo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\Currentversion\Run kubyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kipiqaa = "C:\\Users\\Admin\\AppData\\Roaming\\Anoco\\kubyo.exe" kubyo.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exekubyo.exedescription pid process target process PID 3948 set thread context of 188 3948 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 2264 set thread context of 1900 2264 kubyo.exe kubyo.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
kubyo.exepid process 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe 1900 kubyo.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exedescription pid process Token: SeSecurityPrivilege 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe Token: SeSecurityPrivilege 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exekubyo.exepid process 3948 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 2264 kubyo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exea380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exekubyo.exekubyo.exedescription pid process target process PID 3948 wrote to memory of 188 3948 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 3948 wrote to memory of 188 3948 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 3948 wrote to memory of 188 3948 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 3948 wrote to memory of 188 3948 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 3948 wrote to memory of 188 3948 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 3948 wrote to memory of 188 3948 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 3948 wrote to memory of 188 3948 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 3948 wrote to memory of 188 3948 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 3948 wrote to memory of 188 3948 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 188 wrote to memory of 2264 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe kubyo.exe PID 188 wrote to memory of 2264 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe kubyo.exe PID 188 wrote to memory of 2264 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe kubyo.exe PID 2264 wrote to memory of 1900 2264 kubyo.exe kubyo.exe PID 2264 wrote to memory of 1900 2264 kubyo.exe kubyo.exe PID 2264 wrote to memory of 1900 2264 kubyo.exe kubyo.exe PID 2264 wrote to memory of 1900 2264 kubyo.exe kubyo.exe PID 2264 wrote to memory of 1900 2264 kubyo.exe kubyo.exe PID 2264 wrote to memory of 1900 2264 kubyo.exe kubyo.exe PID 2264 wrote to memory of 1900 2264 kubyo.exe kubyo.exe PID 2264 wrote to memory of 1900 2264 kubyo.exe kubyo.exe PID 2264 wrote to memory of 1900 2264 kubyo.exe kubyo.exe PID 188 wrote to memory of 4052 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe cmd.exe PID 188 wrote to memory of 4052 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe cmd.exe PID 188 wrote to memory of 4052 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe cmd.exe PID 1900 wrote to memory of 2332 1900 kubyo.exe sihost.exe PID 1900 wrote to memory of 2332 1900 kubyo.exe sihost.exe PID 1900 wrote to memory of 2332 1900 kubyo.exe sihost.exe PID 1900 wrote to memory of 2332 1900 kubyo.exe sihost.exe PID 1900 wrote to memory of 2332 1900 kubyo.exe sihost.exe PID 1900 wrote to memory of 2356 1900 kubyo.exe svchost.exe PID 1900 wrote to memory of 2356 1900 kubyo.exe svchost.exe PID 1900 wrote to memory of 2356 1900 kubyo.exe svchost.exe PID 1900 wrote to memory of 2356 1900 kubyo.exe svchost.exe PID 1900 wrote to memory of 2356 1900 kubyo.exe svchost.exe PID 1900 wrote to memory of 2724 1900 kubyo.exe taskhostw.exe PID 1900 wrote to memory of 2724 1900 kubyo.exe taskhostw.exe PID 1900 wrote to memory of 2724 1900 kubyo.exe taskhostw.exe PID 1900 wrote to memory of 2724 1900 kubyo.exe taskhostw.exe PID 1900 wrote to memory of 2724 1900 kubyo.exe taskhostw.exe PID 1900 wrote to memory of 3016 1900 kubyo.exe Explorer.EXE PID 1900 wrote to memory of 3016 1900 kubyo.exe Explorer.EXE PID 1900 wrote to memory of 3016 1900 kubyo.exe Explorer.EXE PID 1900 wrote to memory of 3016 1900 kubyo.exe Explorer.EXE PID 1900 wrote to memory of 3016 1900 kubyo.exe Explorer.EXE PID 1900 wrote to memory of 3220 1900 kubyo.exe ShellExperienceHost.exe PID 1900 wrote to memory of 3220 1900 kubyo.exe ShellExperienceHost.exe PID 1900 wrote to memory of 3220 1900 kubyo.exe ShellExperienceHost.exe PID 1900 wrote to memory of 3220 1900 kubyo.exe ShellExperienceHost.exe PID 1900 wrote to memory of 3220 1900 kubyo.exe ShellExperienceHost.exe PID 1900 wrote to memory of 3240 1900 kubyo.exe SearchUI.exe PID 1900 wrote to memory of 3240 1900 kubyo.exe SearchUI.exe PID 1900 wrote to memory of 3240 1900 kubyo.exe SearchUI.exe PID 1900 wrote to memory of 3240 1900 kubyo.exe SearchUI.exe PID 1900 wrote to memory of 3240 1900 kubyo.exe SearchUI.exe PID 1900 wrote to memory of 3444 1900 kubyo.exe RuntimeBroker.exe PID 1900 wrote to memory of 3444 1900 kubyo.exe RuntimeBroker.exe PID 1900 wrote to memory of 3444 1900 kubyo.exe RuntimeBroker.exe PID 1900 wrote to memory of 3444 1900 kubyo.exe RuntimeBroker.exe PID 1900 wrote to memory of 3444 1900 kubyo.exe RuntimeBroker.exe PID 1900 wrote to memory of 3740 1900 kubyo.exe DllHost.exe PID 1900 wrote to memory of 3740 1900 kubyo.exe DllHost.exe PID 1900 wrote to memory of 3740 1900 kubyo.exe DllHost.exe PID 1900 wrote to memory of 3740 1900 kubyo.exe DllHost.exe PID 1900 wrote to memory of 3740 1900 kubyo.exe DllHost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Anoco\kubyo.exe"C:\Users\Admin\AppData\Roaming\Anoco\kubyo.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Anoco\kubyo.exe"C:\Users\Admin\AppData\Roaming\Anoco\kubyo.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf1d32dae.bat"4⤵
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵
-
c:\windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\System32\slui.exeC:\Windows\System32\slui.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpf1d32dae.batMD5
4bcd0822e301eaf7303abf3f8c47ce1a
SHA14f8a33253a84e8c7af5b9d85d075fa1b94851df0
SHA256640b2a17efb77d4808e9ac43bd2e965015685b2f9fc6f33bd08c9658b1eb6cb4
SHA5129ed3a5fa756956282e8a9931dbccc4aa4216a4e9ad7fe143dee8c71ce48f4a9acdba572969c49924d7c6cf2114c14cfc4cc8fed5c5ddd93b7b410ac8c3c12299
-
C:\Users\Admin\AppData\Roaming\Anoco\kubyo.exeMD5
60a6ff1e35ac2e722a8c39eb50d8e641
SHA16e9d71ab69274efedaf6408485457061b882c4c9
SHA256a87cee9db905314a9a0c0da538e709714b930196ab1602d46ed5339e2e9bc1b6
SHA5122d0d30fe4b65fa6caac82ee36a23266c9b9a9bbdedb2ac61f9929721767224407548a00fbaa7c9e532a91930f4fa63914974a9c7fa735b26f06705c2db5e7a92
-
C:\Users\Admin\AppData\Roaming\Anoco\kubyo.exeMD5
60a6ff1e35ac2e722a8c39eb50d8e641
SHA16e9d71ab69274efedaf6408485457061b882c4c9
SHA256a87cee9db905314a9a0c0da538e709714b930196ab1602d46ed5339e2e9bc1b6
SHA5122d0d30fe4b65fa6caac82ee36a23266c9b9a9bbdedb2ac61f9929721767224407548a00fbaa7c9e532a91930f4fa63914974a9c7fa735b26f06705c2db5e7a92
-
C:\Users\Admin\AppData\Roaming\Anoco\kubyo.exeMD5
60a6ff1e35ac2e722a8c39eb50d8e641
SHA16e9d71ab69274efedaf6408485457061b882c4c9
SHA256a87cee9db905314a9a0c0da538e709714b930196ab1602d46ed5339e2e9bc1b6
SHA5122d0d30fe4b65fa6caac82ee36a23266c9b9a9bbdedb2ac61f9929721767224407548a00fbaa7c9e532a91930f4fa63914974a9c7fa735b26f06705c2db5e7a92
-
memory/188-117-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/188-118-0x000000000042B055-mapping.dmp
-
memory/188-119-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/1900-127-0x000000000042B055-mapping.dmp
-
memory/2264-120-0x0000000000000000-mapping.dmp
-
memory/3948-116-0x0000000002980000-0x00000000029A0000-memory.dmpFilesize
128KB
-
memory/4052-129-0x0000000000000000-mapping.dmp
-
memory/4052-132-0x0000000000630000-0x000000000077A000-memory.dmpFilesize
1.3MB