Analysis
-
max time kernel
150s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 18:33
Static task
static1
Behavioral task
behavioral1
Sample
24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe
Resource
win10v2004-20220901-en
General
-
Target
24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe
-
Size
339KB
-
MD5
06a8f6130141860d668167a90d1018e2
-
SHA1
81419fd283d6a1a5838862ff440b196b4477884e
-
SHA256
24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228
-
SHA512
7f5fdf97c314596a20236707049f7dbff17a4396797225ef13469ea9dda6097bec5dd7b48f9be4c68a3e37ceef168a8f788f7a825c4ae93030661c61c7312577
-
SSDEEP
6144:rXH0Z7/jkBNDpJyBNCoHyXWIpEWMTN7fNeSE9mcOANiLUKC:rXajMN1E5HXlp1E9iAsLC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 968 ryjy.exe -
Deletes itself 1 IoCs
pid Process 1172 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\Currentversion\Run ryjy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7B4F18C8-4FEF-AD4D-3A07-B8B71A0C9BAA} = "C:\\Users\\Admin\\AppData\\Roaming\\Egosf\\ryjy.exe" ryjy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 288 set thread context of 1172 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe 28 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe 968 ryjy.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe 968 ryjy.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 288 wrote to memory of 968 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe 27 PID 288 wrote to memory of 968 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe 27 PID 288 wrote to memory of 968 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe 27 PID 288 wrote to memory of 968 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe 27 PID 968 wrote to memory of 1128 968 ryjy.exe 6 PID 968 wrote to memory of 1128 968 ryjy.exe 6 PID 968 wrote to memory of 1128 968 ryjy.exe 6 PID 968 wrote to memory of 1128 968 ryjy.exe 6 PID 968 wrote to memory of 1128 968 ryjy.exe 6 PID 968 wrote to memory of 1204 968 ryjy.exe 13 PID 968 wrote to memory of 1204 968 ryjy.exe 13 PID 968 wrote to memory of 1204 968 ryjy.exe 13 PID 968 wrote to memory of 1204 968 ryjy.exe 13 PID 968 wrote to memory of 1204 968 ryjy.exe 13 PID 968 wrote to memory of 1268 968 ryjy.exe 7 PID 968 wrote to memory of 1268 968 ryjy.exe 7 PID 968 wrote to memory of 1268 968 ryjy.exe 7 PID 968 wrote to memory of 1268 968 ryjy.exe 7 PID 968 wrote to memory of 1268 968 ryjy.exe 7 PID 968 wrote to memory of 288 968 ryjy.exe 22 PID 968 wrote to memory of 288 968 ryjy.exe 22 PID 968 wrote to memory of 288 968 ryjy.exe 22 PID 968 wrote to memory of 288 968 ryjy.exe 22 PID 968 wrote to memory of 288 968 ryjy.exe 22 PID 288 wrote to memory of 1172 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe 28 PID 288 wrote to memory of 1172 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe 28 PID 288 wrote to memory of 1172 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe 28 PID 288 wrote to memory of 1172 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe 28 PID 288 wrote to memory of 1172 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe 28 PID 288 wrote to memory of 1172 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe 28 PID 288 wrote to memory of 1172 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe 28 PID 288 wrote to memory of 1172 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe 28 PID 288 wrote to memory of 1172 288 24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe 28
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe"C:\Users\Admin\AppData\Local\Temp\24b0525d45c18ead9d05c129d8f25ed7f8a1754218c35a8c8993246dc1c69228.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Users\Admin\AppData\Roaming\Egosf\ryjy.exe"C:\Users\Admin\AppData\Roaming\Egosf\ryjy.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:968
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp47b0daf5.bat"3⤵
- Deletes itself
PID:1172
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5d2bd8b3ae1402f3bb1d2310cb3502c42
SHA19ab1ee22446d6b53117be5b4e39034300267ef42
SHA256cc36d16429971a83527d91e04064bcbf8db7d3ef8e66abc643668cbba2d11f6c
SHA5129c9409116695bdfcec51832924343ecf405837651b7aaa685f64101cca7480a4913b398cfdb9624e243e1dd41e92688e4603388d2d882f3e028c3f9a48e7e264
-
Filesize
339KB
MD50d1646ccd004612a5278bff727f59100
SHA1dc8173d4fcf8c14b4750d6c0cb6599e629f5e21f
SHA256ddbcca24cf69854b07d3548697af87fbb1249e3d63b1e5ddc43fef0820af8735
SHA5129f7d08d4b1e44e5d7d0abbd5eeb62bb7b016aa78b1b352885a0d55e30797a06f37027ff552855035acbb16480fbae9bb443d0c9c5e60fb0ea2c473405c5203e6
-
Filesize
339KB
MD50d1646ccd004612a5278bff727f59100
SHA1dc8173d4fcf8c14b4750d6c0cb6599e629f5e21f
SHA256ddbcca24cf69854b07d3548697af87fbb1249e3d63b1e5ddc43fef0820af8735
SHA5129f7d08d4b1e44e5d7d0abbd5eeb62bb7b016aa78b1b352885a0d55e30797a06f37027ff552855035acbb16480fbae9bb443d0c9c5e60fb0ea2c473405c5203e6
-
Filesize
339KB
MD50d1646ccd004612a5278bff727f59100
SHA1dc8173d4fcf8c14b4750d6c0cb6599e629f5e21f
SHA256ddbcca24cf69854b07d3548697af87fbb1249e3d63b1e5ddc43fef0820af8735
SHA5129f7d08d4b1e44e5d7d0abbd5eeb62bb7b016aa78b1b352885a0d55e30797a06f37027ff552855035acbb16480fbae9bb443d0c9c5e60fb0ea2c473405c5203e6