Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 19:16
Behavioral task
behavioral1
Sample
8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe
Resource
win10v2004-20220901-en
General
-
Target
8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe
-
Size
191KB
-
MD5
3d380a7c6c9918259741b986650f8a5d
-
SHA1
4c390abee3f2dcee386f6ba5fc8b00d734207a7e
-
SHA256
8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778
-
SHA512
3b22ee25183e56ccf448cdf26d25a9ced1824b0119fb45a67a713ab4942baa4f4c1a9f9c2c183fc54ee347ffe0e32079089a6780872c1107eeadc352f2eef7de
-
SSDEEP
3072:3MKRGUlmlzOdQwCnUTDaioya+ghKr5Gb9C3HZkvtGTwtoT4/KtPaffT+Iyo:1MajQwqUTDaioKERC3HytGTwtqtPa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 696 izbyd.exe -
resource yara_rule behavioral1/files/0x000c0000000122f1-55.dat upx behavioral1/files/0x000c0000000122f1-56.dat upx behavioral1/files/0x000c0000000122f1-58.dat upx behavioral1/files/0x000c0000000122f1-60.dat upx -
Deletes itself 1 IoCs
pid Process 1908 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\Currentversion\Run izbyd.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\{91C05068-4FEF-AD4D-7F1F-8FEC7D0BACF1} = "C:\\Users\\Admin\\AppData\\Roaming\\Uxica\\izbyd.exe" izbyd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1720 set thread context of 1908 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe 696 izbyd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe Token: SeSecurityPrivilege 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe Token: SeSecurityPrivilege 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1720 wrote to memory of 696 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe 27 PID 1720 wrote to memory of 696 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe 27 PID 1720 wrote to memory of 696 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe 27 PID 1720 wrote to memory of 696 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe 27 PID 696 wrote to memory of 1132 696 izbyd.exe 16 PID 696 wrote to memory of 1132 696 izbyd.exe 16 PID 696 wrote to memory of 1132 696 izbyd.exe 16 PID 696 wrote to memory of 1132 696 izbyd.exe 16 PID 696 wrote to memory of 1132 696 izbyd.exe 16 PID 696 wrote to memory of 1224 696 izbyd.exe 15 PID 696 wrote to memory of 1224 696 izbyd.exe 15 PID 696 wrote to memory of 1224 696 izbyd.exe 15 PID 696 wrote to memory of 1224 696 izbyd.exe 15 PID 696 wrote to memory of 1224 696 izbyd.exe 15 PID 696 wrote to memory of 1260 696 izbyd.exe 14 PID 696 wrote to memory of 1260 696 izbyd.exe 14 PID 696 wrote to memory of 1260 696 izbyd.exe 14 PID 696 wrote to memory of 1260 696 izbyd.exe 14 PID 696 wrote to memory of 1260 696 izbyd.exe 14 PID 696 wrote to memory of 1720 696 izbyd.exe 26 PID 696 wrote to memory of 1720 696 izbyd.exe 26 PID 696 wrote to memory of 1720 696 izbyd.exe 26 PID 696 wrote to memory of 1720 696 izbyd.exe 26 PID 696 wrote to memory of 1720 696 izbyd.exe 26 PID 1720 wrote to memory of 1908 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe 28 PID 1720 wrote to memory of 1908 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe 28 PID 1720 wrote to memory of 1908 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe 28 PID 1720 wrote to memory of 1908 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe 28 PID 1720 wrote to memory of 1908 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe 28 PID 1720 wrote to memory of 1908 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe 28 PID 1720 wrote to memory of 1908 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe 28 PID 1720 wrote to memory of 1908 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe 28 PID 1720 wrote to memory of 1908 1720 8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe 28 PID 696 wrote to memory of 1320 696 izbyd.exe 29 PID 696 wrote to memory of 1320 696 izbyd.exe 29 PID 696 wrote to memory of 1320 696 izbyd.exe 29 PID 696 wrote to memory of 1320 696 izbyd.exe 29 PID 696 wrote to memory of 1320 696 izbyd.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe"C:\Users\Admin\AppData\Local\Temp\8a584a0d9f5e812a868e978bfe54d2aa69be25fa96fa2b44f77529136bbca778.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Roaming\Uxica\izbyd.exe"C:\Users\Admin\AppData\Roaming\Uxica\izbyd.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:696
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp2b549174.bat"3⤵
- Deletes itself
PID:1908
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1224
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-645621703-1039150873-1107256381-523343123-972888906-12879458801783073673877305545"1⤵PID:1320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5044ce97358e026c12afd728fcfc32ca2
SHA18d0269a9f253bcbdf1949752f996fa396066e009
SHA256939922245a73cc2a0b99e65345a093118dda61b638043117f7ff1f77d4cf904b
SHA5125e27a96f0044b1cbcdb5c07f3d7d5ffd32b30af05124e5212d9e064a78cf2078596f6bff55996d9daf3d09fa54484c66fe68edd8b98fe6a632a9bf1c1f038c96
-
Filesize
398B
MD52d47d799f172d404e11b6e7ffb9ca40d
SHA1a2b979e491be3954cc4e90eb9473cdcb70ac4e73
SHA25658e53e61f4af09827d3e04078717aee868dc811ed59a01cc7aa14905935c7a3e
SHA512f8f90fe7fa559233050dd510a73678a4926e0cacc961b36112666846fdf903dcd25e442c7dcf56d3338d645a766c382c7ff75ad2e2de5898895e7db4b4a525a5
-
Filesize
191KB
MD5d10958f3328e57b1ab16766cced3452d
SHA18ef28466741ae74d8172e4be062c546533029fb8
SHA256f72357622508a26262acb2d86e25404fb9682765fbe0c868545a5a1b2bd30097
SHA512ee54fe5440df43c32f40b515e0afb71855a5b41305d6636186c58a915952d034432cabdd6471e428157cb4ece6c872dbca13a70eaeb1bdb990d9ee29bf7cb50c
-
Filesize
191KB
MD5d10958f3328e57b1ab16766cced3452d
SHA18ef28466741ae74d8172e4be062c546533029fb8
SHA256f72357622508a26262acb2d86e25404fb9682765fbe0c868545a5a1b2bd30097
SHA512ee54fe5440df43c32f40b515e0afb71855a5b41305d6636186c58a915952d034432cabdd6471e428157cb4ece6c872dbca13a70eaeb1bdb990d9ee29bf7cb50c
-
Filesize
191KB
MD5d10958f3328e57b1ab16766cced3452d
SHA18ef28466741ae74d8172e4be062c546533029fb8
SHA256f72357622508a26262acb2d86e25404fb9682765fbe0c868545a5a1b2bd30097
SHA512ee54fe5440df43c32f40b515e0afb71855a5b41305d6636186c58a915952d034432cabdd6471e428157cb4ece6c872dbca13a70eaeb1bdb990d9ee29bf7cb50c
-
Filesize
191KB
MD5d10958f3328e57b1ab16766cced3452d
SHA18ef28466741ae74d8172e4be062c546533029fb8
SHA256f72357622508a26262acb2d86e25404fb9682765fbe0c868545a5a1b2bd30097
SHA512ee54fe5440df43c32f40b515e0afb71855a5b41305d6636186c58a915952d034432cabdd6471e428157cb4ece6c872dbca13a70eaeb1bdb990d9ee29bf7cb50c