Overview
overview
10Static
static
10lab_02_win...5b.exe
windows7_x64
8lab_02_win...5b.exe
windows10_x64
8lab_02_win...82.exe
windows7_x64
8lab_02_win...82.exe
windows10_x64
8lab_02_win...63.exe
windows7_x64
10lab_02_win...63.exe
windows10_x64
10lab_02_win...15.exe
windows7_x64
8lab_02_win...15.exe
windows10_x64
8lab_02_win...c7.exe
windows7_x64
8lab_02_win...c7.exe
windows10_x64
8Analysis
-
max time kernel
150s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
25-06-2021 11:02
Behavioral task
behavioral1
Sample
lab_02_win10x64/1e3966e77ad1cbf3e3ef76803fbf92300b2b88af39650a1208520e0cdc05645b.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
lab_02_win10x64/1e3966e77ad1cbf3e3ef76803fbf92300b2b88af39650a1208520e0cdc05645b.exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
lab_02_win10x64/6562e2ac60afa314cd463f771fcfb8be70f947f6e2b314b0c48187eebb33dd82.exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
lab_02_win10x64/6562e2ac60afa314cd463f771fcfb8be70f947f6e2b314b0c48187eebb33dd82.exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
lab_02_win10x64/6d34ded00c0da9887ba752872093f59c649de72a1f629a32014f5ed8be509363.exe
Resource
win7v20210408
Behavioral task
behavioral6
Sample
lab_02_win10x64/6d34ded00c0da9887ba752872093f59c649de72a1f629a32014f5ed8be509363.exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
lab_02_win10x64/a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
Resource
win7v20210408
Behavioral task
behavioral8
Sample
lab_02_win10x64/a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
lab_02_win10x64/b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7.exe
Resource
win7v20210408
Behavioral task
behavioral10
Sample
lab_02_win10x64/b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7.exe
Resource
win10v20210410
General
-
Target
lab_02_win10x64/a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
cisyt.execisyt.exepid process 660 cisyt.exe 1116 cisyt.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
cisyt.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\Currentversion\Run cisyt.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\Currentversion\Run cisyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Owuzogidag = "C:\\Users\\Admin\\AppData\\Roaming\\Aqgoqu\\cisyt.exe" cisyt.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.execisyt.exedescription pid process target process PID 4044 set thread context of 188 4044 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 660 set thread context of 1116 660 cisyt.exe cisyt.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
cisyt.exepid process 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe 1116 cisyt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exedescription pid process Token: SeSecurityPrivilege 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe Token: SeSecurityPrivilege 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.execisyt.exepid process 4044 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 660 cisyt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exea380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.execisyt.execisyt.exedescription pid process target process PID 4044 wrote to memory of 188 4044 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 4044 wrote to memory of 188 4044 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 4044 wrote to memory of 188 4044 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 4044 wrote to memory of 188 4044 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 4044 wrote to memory of 188 4044 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 4044 wrote to memory of 188 4044 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 4044 wrote to memory of 188 4044 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 4044 wrote to memory of 188 4044 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 4044 wrote to memory of 188 4044 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe PID 188 wrote to memory of 660 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe cisyt.exe PID 188 wrote to memory of 660 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe cisyt.exe PID 188 wrote to memory of 660 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe cisyt.exe PID 660 wrote to memory of 1116 660 cisyt.exe cisyt.exe PID 660 wrote to memory of 1116 660 cisyt.exe cisyt.exe PID 660 wrote to memory of 1116 660 cisyt.exe cisyt.exe PID 660 wrote to memory of 1116 660 cisyt.exe cisyt.exe PID 660 wrote to memory of 1116 660 cisyt.exe cisyt.exe PID 660 wrote to memory of 1116 660 cisyt.exe cisyt.exe PID 660 wrote to memory of 1116 660 cisyt.exe cisyt.exe PID 660 wrote to memory of 1116 660 cisyt.exe cisyt.exe PID 660 wrote to memory of 1116 660 cisyt.exe cisyt.exe PID 1116 wrote to memory of 2436 1116 cisyt.exe svchost.exe PID 1116 wrote to memory of 2436 1116 cisyt.exe svchost.exe PID 1116 wrote to memory of 2436 1116 cisyt.exe svchost.exe PID 1116 wrote to memory of 2436 1116 cisyt.exe svchost.exe PID 1116 wrote to memory of 2436 1116 cisyt.exe svchost.exe PID 188 wrote to memory of 1872 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe cmd.exe PID 188 wrote to memory of 1872 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe cmd.exe PID 188 wrote to memory of 1872 188 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe cmd.exe PID 1116 wrote to memory of 2460 1116 cisyt.exe sihost.exe PID 1116 wrote to memory of 2460 1116 cisyt.exe sihost.exe PID 1116 wrote to memory of 2460 1116 cisyt.exe sihost.exe PID 1116 wrote to memory of 2460 1116 cisyt.exe sihost.exe PID 1116 wrote to memory of 2460 1116 cisyt.exe sihost.exe PID 1116 wrote to memory of 2704 1116 cisyt.exe taskhostw.exe PID 1116 wrote to memory of 2704 1116 cisyt.exe taskhostw.exe PID 1116 wrote to memory of 2704 1116 cisyt.exe taskhostw.exe PID 1116 wrote to memory of 2704 1116 cisyt.exe taskhostw.exe PID 1116 wrote to memory of 2704 1116 cisyt.exe taskhostw.exe PID 1116 wrote to memory of 2764 1116 cisyt.exe Explorer.EXE PID 1116 wrote to memory of 2764 1116 cisyt.exe Explorer.EXE PID 1116 wrote to memory of 2764 1116 cisyt.exe Explorer.EXE PID 1116 wrote to memory of 2764 1116 cisyt.exe Explorer.EXE PID 1116 wrote to memory of 2764 1116 cisyt.exe Explorer.EXE PID 1116 wrote to memory of 3356 1116 cisyt.exe ShellExperienceHost.exe PID 1116 wrote to memory of 3356 1116 cisyt.exe ShellExperienceHost.exe PID 1116 wrote to memory of 3356 1116 cisyt.exe ShellExperienceHost.exe PID 1116 wrote to memory of 3356 1116 cisyt.exe ShellExperienceHost.exe PID 1116 wrote to memory of 3356 1116 cisyt.exe ShellExperienceHost.exe PID 1116 wrote to memory of 3368 1116 cisyt.exe SearchUI.exe PID 1116 wrote to memory of 3368 1116 cisyt.exe SearchUI.exe PID 1116 wrote to memory of 3368 1116 cisyt.exe SearchUI.exe PID 1116 wrote to memory of 3368 1116 cisyt.exe SearchUI.exe PID 1116 wrote to memory of 3368 1116 cisyt.exe SearchUI.exe PID 1116 wrote to memory of 3580 1116 cisyt.exe RuntimeBroker.exe PID 1116 wrote to memory of 3580 1116 cisyt.exe RuntimeBroker.exe PID 1116 wrote to memory of 3580 1116 cisyt.exe RuntimeBroker.exe PID 1116 wrote to memory of 3580 1116 cisyt.exe RuntimeBroker.exe PID 1116 wrote to memory of 3580 1116 cisyt.exe RuntimeBroker.exe PID 1116 wrote to memory of 3836 1116 cisyt.exe DllHost.exe PID 1116 wrote to memory of 3836 1116 cisyt.exe DllHost.exe PID 1116 wrote to memory of 3836 1116 cisyt.exe DllHost.exe PID 1116 wrote to memory of 3836 1116 cisyt.exe DllHost.exe PID 1116 wrote to memory of 3836 1116 cisyt.exe DllHost.exe
Processes
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵PID:3356
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3836
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3580
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵PID:3368
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:188 -
C:\Users\Admin\AppData\Roaming\Aqgoqu\cisyt.exe"C:\Users\Admin\AppData\Roaming\Aqgoqu\cisyt.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Roaming\Aqgoqu\cisyt.exe"C:\Users\Admin\AppData\Roaming\Aqgoqu\cisyt.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf5357bc0.bat"4⤵PID:1872
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3748
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2704
-
c:\windows\system32\sihost.exesihost.exe1⤵PID:2460
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵PID:2436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
45a9a3d63951dee6715b88211fee852b
SHA10de965b7daf6220857bc25cbc858159e0b0368ce
SHA256bb3a3e89dcfff19e875db4c2d1e5c4d315d3539db3270c60ddd9e46fe65c6f8f
SHA512a3930704b5dddde601989e9e62f7057a4a4a3d6b851912e44949f84d93fc56e1dfa1ee9bd40ce59539a82de793033a6b2517e880ed09c60359fcf497164b0bed
-
MD5
a8bf719a32ea1e65d8067e165d9e5bb8
SHA1dc4efc0fc0ef9b54df5c96ca2640564fd71ed17a
SHA2562b94ae9b3b3db2aa2f015a9d37a5b5d9b7eeb9d35687fe6c97f12fef302ab637
SHA5120b428243570a7db271e7c1c3f2d9777ac14d3b5dd1f9957eacb6df49555b95f0f1daa324b1a66851cdd0476adcd7352cd405d2829b9fe01bd52717f09aff0bb8
-
MD5
a8bf719a32ea1e65d8067e165d9e5bb8
SHA1dc4efc0fc0ef9b54df5c96ca2640564fd71ed17a
SHA2562b94ae9b3b3db2aa2f015a9d37a5b5d9b7eeb9d35687fe6c97f12fef302ab637
SHA5120b428243570a7db271e7c1c3f2d9777ac14d3b5dd1f9957eacb6df49555b95f0f1daa324b1a66851cdd0476adcd7352cd405d2829b9fe01bd52717f09aff0bb8
-
MD5
a8bf719a32ea1e65d8067e165d9e5bb8
SHA1dc4efc0fc0ef9b54df5c96ca2640564fd71ed17a
SHA2562b94ae9b3b3db2aa2f015a9d37a5b5d9b7eeb9d35687fe6c97f12fef302ab637
SHA5120b428243570a7db271e7c1c3f2d9777ac14d3b5dd1f9957eacb6df49555b95f0f1daa324b1a66851cdd0476adcd7352cd405d2829b9fe01bd52717f09aff0bb8