Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 03:23
Static task
static1
Behavioral task
behavioral1
Sample
00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe
Resource
win10v2004-20220414-en
General
-
Target
00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe
-
Size
361KB
-
MD5
7bd0e512edd2194c38864df24bbaa71d
-
SHA1
bc811c561cbde749b28f9f3b58f57b1ccc699f1a
-
SHA256
00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8
-
SHA512
6f0ea99edf859f8a9fb58fd7cd23efcb7aa284323acb40f426c9eaa780f258c157f61b275ce4d24d359aa42b4c6bfcdb05d04d63acacf0631f8eeee0c837fb81
Malware Config
Signatures
-
suricata: ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative)
suricata: ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative)
-
suricata: ET MALWARE Zbot POST Request to C2
suricata: ET MALWARE Zbot POST Request to C2
-
Executes dropped EXE 2 IoCs
Processes:
badotyyry.exebadotyyry.exepid process 1128 badotyyry.exe 1692 badotyyry.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 536 cmd.exe -
Loads dropped DLL 6 IoCs
Processes:
00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exebadotyyry.exepid process 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe 1692 badotyyry.exe 1692 badotyyry.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
badotyyry.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\SOFTWARE\Microsoft\Windows\Currentversion\Run badotyyry.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\Currentversion\Run badotyyry.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Pyqow = "C:\\Users\\Admin\\AppData\\Roaming\\Ytnuotegivna\\badotyyry.exe" badotyyry.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exebadotyyry.exedescription pid process target process PID 376 set thread context of 912 376 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe PID 1128 set thread context of 1692 1128 badotyyry.exe badotyyry.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exebadotyyry.exepid process 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe 1692 badotyyry.exe 1692 badotyyry.exe 1692 badotyyry.exe 1692 badotyyry.exe 1692 badotyyry.exe 1692 badotyyry.exe 1692 badotyyry.exe 1692 badotyyry.exe 1692 badotyyry.exe 1692 badotyyry.exe 1692 badotyyry.exe 1692 badotyyry.exe 1692 badotyyry.exe 1692 badotyyry.exe 1692 badotyyry.exe 1692 badotyyry.exe 1692 badotyyry.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exebadotyyry.exedescription pid process Token: SeSecurityPrivilege 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe Token: SeSecurityPrivilege 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe Token: SeSecurityPrivilege 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe Token: SeSecurityPrivilege 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe Token: SeSecurityPrivilege 1692 badotyyry.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exebadotyyry.exebadotyyry.exedescription pid process target process PID 376 wrote to memory of 912 376 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe PID 376 wrote to memory of 912 376 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe PID 376 wrote to memory of 912 376 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe PID 376 wrote to memory of 912 376 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe PID 376 wrote to memory of 912 376 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe PID 376 wrote to memory of 912 376 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe PID 376 wrote to memory of 912 376 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe PID 376 wrote to memory of 912 376 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe PID 376 wrote to memory of 912 376 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe PID 912 wrote to memory of 1128 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe badotyyry.exe PID 912 wrote to memory of 1128 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe badotyyry.exe PID 912 wrote to memory of 1128 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe badotyyry.exe PID 912 wrote to memory of 1128 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe badotyyry.exe PID 1128 wrote to memory of 1692 1128 badotyyry.exe badotyyry.exe PID 1128 wrote to memory of 1692 1128 badotyyry.exe badotyyry.exe PID 1128 wrote to memory of 1692 1128 badotyyry.exe badotyyry.exe PID 1128 wrote to memory of 1692 1128 badotyyry.exe badotyyry.exe PID 1128 wrote to memory of 1692 1128 badotyyry.exe badotyyry.exe PID 1128 wrote to memory of 1692 1128 badotyyry.exe badotyyry.exe PID 1128 wrote to memory of 1692 1128 badotyyry.exe badotyyry.exe PID 1128 wrote to memory of 1692 1128 badotyyry.exe badotyyry.exe PID 1128 wrote to memory of 1692 1128 badotyyry.exe badotyyry.exe PID 912 wrote to memory of 536 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe cmd.exe PID 912 wrote to memory of 536 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe cmd.exe PID 912 wrote to memory of 536 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe cmd.exe PID 912 wrote to memory of 536 912 00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe cmd.exe PID 1692 wrote to memory of 1108 1692 badotyyry.exe taskhost.exe PID 1692 wrote to memory of 1108 1692 badotyyry.exe taskhost.exe PID 1692 wrote to memory of 1108 1692 badotyyry.exe taskhost.exe PID 1692 wrote to memory of 1108 1692 badotyyry.exe taskhost.exe PID 1692 wrote to memory of 1108 1692 badotyyry.exe taskhost.exe PID 1692 wrote to memory of 1192 1692 badotyyry.exe Dwm.exe PID 1692 wrote to memory of 1192 1692 badotyyry.exe Dwm.exe PID 1692 wrote to memory of 1192 1692 badotyyry.exe Dwm.exe PID 1692 wrote to memory of 1192 1692 badotyyry.exe Dwm.exe PID 1692 wrote to memory of 1192 1692 badotyyry.exe Dwm.exe PID 1692 wrote to memory of 1220 1692 badotyyry.exe Explorer.EXE PID 1692 wrote to memory of 1220 1692 badotyyry.exe Explorer.EXE PID 1692 wrote to memory of 1220 1692 badotyyry.exe Explorer.EXE PID 1692 wrote to memory of 1220 1692 badotyyry.exe Explorer.EXE PID 1692 wrote to memory of 1220 1692 badotyyry.exe Explorer.EXE PID 1692 wrote to memory of 1972 1692 badotyyry.exe DllHost.exe PID 1692 wrote to memory of 1972 1692 badotyyry.exe DllHost.exe PID 1692 wrote to memory of 1972 1692 badotyyry.exe DllHost.exe PID 1692 wrote to memory of 1972 1692 badotyyry.exe DllHost.exe PID 1692 wrote to memory of 1972 1692 badotyyry.exe DllHost.exe PID 1692 wrote to memory of 1604 1692 badotyyry.exe DllHost.exe PID 1692 wrote to memory of 1604 1692 badotyyry.exe DllHost.exe PID 1692 wrote to memory of 1604 1692 badotyyry.exe DllHost.exe PID 1692 wrote to memory of 1604 1692 badotyyry.exe DllHost.exe PID 1692 wrote to memory of 1604 1692 badotyyry.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe"C:\Users\Admin\AppData\Local\Temp\00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe"C:\Users\Admin\AppData\Local\Temp\00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Roaming\Ytnuotegivna\badotyyry.exe"C:\Users\Admin\AppData\Roaming\Ytnuotegivna\badotyyry.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Roaming\Ytnuotegivna\badotyyry.exe"C:\Users\Admin\AppData\Roaming\Ytnuotegivna\badotyyry.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd7c1400b.bat"3⤵
- Deletes itself
PID:536
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1972
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1604
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD5934aa9eb81516482c6367fb116ec9b1f
SHA11a97f913ef76ff83b1ba87c735b597b7b7564ae6
SHA256ecb5eb3c67cb390de6fca259684385d1b839f2fa9b96c3198eb5837ebb65c609
SHA512608d4a3dffb258db8418197dbc28c5bd814ca15517b4a96e6b51a3f36da586379c724ba32f4d413cd9d155bcd47780964567860df7352f2c437de297ab30d118
-
Filesize
361KB
MD57bd0e512edd2194c38864df24bbaa71d
SHA1bc811c561cbde749b28f9f3b58f57b1ccc699f1a
SHA25600f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8
SHA5126f0ea99edf859f8a9fb58fd7cd23efcb7aa284323acb40f426c9eaa780f258c157f61b275ce4d24d359aa42b4c6bfcdb05d04d63acacf0631f8eeee0c837fb81
-
Filesize
307B
MD55a6dd9bbd3413c9b560eacc0ea5e50f2
SHA19f8f2f76e532382d01443abab3b5749ad5cc95f8
SHA25607675f7d7e1fc2215893e7efa0fe326d9cf6b6718640bdaee728811e72d6eecc
SHA512b3e0aeea8a637b6f9d982ceea8195c6ea74119eda5fdf5c4ab7671f34627264fd98cdf4f733414d9213749d2ab0deef6dffcc9bdcaf6cb5232da97b283b29042
-
Filesize
361KB
MD5288e3438575e2a3e65dfafd8dfa50d92
SHA1a64bb373a127b620c8fddf44af79b7711e467e59
SHA2562009b8ec2e79c5250ab66e39d1d4c5195aac09909647868efc9d785cd795a2ff
SHA512a80060b8561a2fe777c4f927898eececf33e802b17970171b736cfe50fee0a77e3bd14130c93f40873f189ce03966dabee4c484f0d26b267091c203adfd34431
-
Filesize
361KB
MD5288e3438575e2a3e65dfafd8dfa50d92
SHA1a64bb373a127b620c8fddf44af79b7711e467e59
SHA2562009b8ec2e79c5250ab66e39d1d4c5195aac09909647868efc9d785cd795a2ff
SHA512a80060b8561a2fe777c4f927898eececf33e802b17970171b736cfe50fee0a77e3bd14130c93f40873f189ce03966dabee4c484f0d26b267091c203adfd34431
-
Filesize
361KB
MD5288e3438575e2a3e65dfafd8dfa50d92
SHA1a64bb373a127b620c8fddf44af79b7711e467e59
SHA2562009b8ec2e79c5250ab66e39d1d4c5195aac09909647868efc9d785cd795a2ff
SHA512a80060b8561a2fe777c4f927898eececf33e802b17970171b736cfe50fee0a77e3bd14130c93f40873f189ce03966dabee4c484f0d26b267091c203adfd34431
-
Filesize
964KB
MD5469725980923df7f823172bb493ea5a4
SHA12a9f963411cb8bc69e29587afc2d1879949caf7d
SHA25654dfc1cd5c13aeae9dc40593fd0d2643975f7d9a4506e4b4536dcfac12249756
SHA512b443a4026d183bee1fa8b240e8e6125366ee9d0a5eca160ec15e4d15f635c280dced81f5af5912abcaa16d3d17e34c1629f769721983fcffb099026dfa2c98c6
-
Filesize
1.1MB
MD59b98d47916ead4f69ef51b56b0c2323c
SHA1290a80b4ded0efc0fd00816f373fcea81a521330
SHA25696e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b
SHA51268b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
1.1MB
MD59b98d47916ead4f69ef51b56b0c2323c
SHA1290a80b4ded0efc0fd00816f373fcea81a521330
SHA25696e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b
SHA51268b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94
-
Filesize
361KB
MD5288e3438575e2a3e65dfafd8dfa50d92
SHA1a64bb373a127b620c8fddf44af79b7711e467e59
SHA2562009b8ec2e79c5250ab66e39d1d4c5195aac09909647868efc9d785cd795a2ff
SHA512a80060b8561a2fe777c4f927898eececf33e802b17970171b736cfe50fee0a77e3bd14130c93f40873f189ce03966dabee4c484f0d26b267091c203adfd34431
-
Filesize
361KB
MD5288e3438575e2a3e65dfafd8dfa50d92
SHA1a64bb373a127b620c8fddf44af79b7711e467e59
SHA2562009b8ec2e79c5250ab66e39d1d4c5195aac09909647868efc9d785cd795a2ff
SHA512a80060b8561a2fe777c4f927898eececf33e802b17970171b736cfe50fee0a77e3bd14130c93f40873f189ce03966dabee4c484f0d26b267091c203adfd34431