Analysis
-
max time kernel
151s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe
Resource
win10v2004-20220901-en
General
-
Target
5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe
-
Size
298KB
-
MD5
bae857d595c43964c0ca2fb3343e0e03
-
SHA1
c72272e0eca993702900a8a56d3d392c00dd6c5e
-
SHA256
5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b
-
SHA512
f4569ecf284e5e9b0a6e6a06ee06de20fcd2adefd0bfb4da3c46baf49bf4ba98f5ac3e33c3a8abb80428ee47fdfbc0ebb8796d63d5292c5a5ec988ad9022a8d7
-
SSDEEP
3072:9ape7FPXvomWqLEnCYvcvIXRTy1hmUI0xlOcw1IvS3oGcFuG9hFoHk148GzMwcp7:W0XAvDx8hzNxl81IvSiFxTO8GzMf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 964 xiyp.exe -
Deletes itself 1 IoCs
pid Process 868 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\Currentversion\Run xiyp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7B4F18C8-4FEF-AD4D-3A07-B8B71A0C9BAA} = "C:\\Users\\Admin\\AppData\\Roaming\\Peulc\\xiyp.exe" xiyp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1964 set thread context of 868 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe 29 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Privacy 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe 964 xiyp.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe 964 xiyp.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1964 wrote to memory of 964 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe 28 PID 1964 wrote to memory of 964 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe 28 PID 1964 wrote to memory of 964 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe 28 PID 1964 wrote to memory of 964 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe 28 PID 964 wrote to memory of 1120 964 xiyp.exe 12 PID 964 wrote to memory of 1120 964 xiyp.exe 12 PID 964 wrote to memory of 1120 964 xiyp.exe 12 PID 964 wrote to memory of 1120 964 xiyp.exe 12 PID 964 wrote to memory of 1120 964 xiyp.exe 12 PID 964 wrote to memory of 1176 964 xiyp.exe 11 PID 964 wrote to memory of 1176 964 xiyp.exe 11 PID 964 wrote to memory of 1176 964 xiyp.exe 11 PID 964 wrote to memory of 1176 964 xiyp.exe 11 PID 964 wrote to memory of 1176 964 xiyp.exe 11 PID 964 wrote to memory of 1204 964 xiyp.exe 10 PID 964 wrote to memory of 1204 964 xiyp.exe 10 PID 964 wrote to memory of 1204 964 xiyp.exe 10 PID 964 wrote to memory of 1204 964 xiyp.exe 10 PID 964 wrote to memory of 1204 964 xiyp.exe 10 PID 964 wrote to memory of 1964 964 xiyp.exe 15 PID 964 wrote to memory of 1964 964 xiyp.exe 15 PID 964 wrote to memory of 1964 964 xiyp.exe 15 PID 964 wrote to memory of 1964 964 xiyp.exe 15 PID 964 wrote to memory of 1964 964 xiyp.exe 15 PID 1964 wrote to memory of 868 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe 29 PID 1964 wrote to memory of 868 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe 29 PID 1964 wrote to memory of 868 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe 29 PID 1964 wrote to memory of 868 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe 29 PID 1964 wrote to memory of 868 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe 29 PID 1964 wrote to memory of 868 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe 29 PID 1964 wrote to memory of 868 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe 29 PID 1964 wrote to memory of 868 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe 29 PID 1964 wrote to memory of 868 1964 5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe"C:\Users\Admin\AppData\Local\Temp\5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Roaming\Peulc\xiyp.exe"C:\Users\Admin\AppData\Roaming\Peulc\xiyp.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:964
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc7adde18.bat"3⤵
- Deletes itself
PID:868
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD58f49cfb243b6740738eb546f86e347d5
SHA191a89ef667d4d28e0cf9e133a45a29f94c0172d0
SHA2569b19b16d8a763772e4b6b99c5e90873b93baf40cd2116895f7baa4aad9ea66d9
SHA5122ff15671db04e6d7c8eb054d03f0790d720398c0e5c47f755bcc3a160b07f45c4e3a55907811a7f2ba45cc19b65767901065e026b74cc5784f012b5c51fe4d2a
-
Filesize
298KB
MD5030099d6a0da363a54b233f960558071
SHA11986cf8b5c2e6ff95fbf6b26ba0b1facebf07bfd
SHA256865faf8a2b5e730df599dab38532820fd2c3111fa7c1f1200eb558126a2e884b
SHA512afeb70b67c29a5dab706c0c9ac48174eb1b0d2d1a0df9f75e98ccee494f179dcab164a121841652977be1e3e1f1371185f347d1a120e710057348fe5fa23a784
-
Filesize
298KB
MD5030099d6a0da363a54b233f960558071
SHA11986cf8b5c2e6ff95fbf6b26ba0b1facebf07bfd
SHA256865faf8a2b5e730df599dab38532820fd2c3111fa7c1f1200eb558126a2e884b
SHA512afeb70b67c29a5dab706c0c9ac48174eb1b0d2d1a0df9f75e98ccee494f179dcab164a121841652977be1e3e1f1371185f347d1a120e710057348fe5fa23a784
-
Filesize
298KB
MD5030099d6a0da363a54b233f960558071
SHA11986cf8b5c2e6ff95fbf6b26ba0b1facebf07bfd
SHA256865faf8a2b5e730df599dab38532820fd2c3111fa7c1f1200eb558126a2e884b
SHA512afeb70b67c29a5dab706c0c9ac48174eb1b0d2d1a0df9f75e98ccee494f179dcab164a121841652977be1e3e1f1371185f347d1a120e710057348fe5fa23a784