Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe
Resource
win10v2004-20220901-en
General
-
Target
afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe
-
Size
308KB
-
MD5
7100d74c77403b2b8efd3580fd158441
-
SHA1
b9bf41e3aff8d0c298335121881001573c7c5fa7
-
SHA256
afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735
-
SHA512
3e090d454e0eb21f4354d396036ba3665e08fe3952ac2567802f228c4421669e5b698ea1767ac954091909efde0719a245e97513d3f9fd07a5ff6d065a1e1462
-
SSDEEP
6144:O4fge2RcBvTqnyW1x/UhHmi0RrN6uWKXOFfa:Hb2R2rqnhUtmdRrN6FK2i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1128 maybx.exe -
Deletes itself 1 IoCs
pid Process 360 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run maybx.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Maybx = "C:\\Users\\Admin\\AppData\\Roaming\\Ykiver\\maybx.exe" maybx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1464 set thread context of 360 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe 1128 maybx.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1128 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe 27 PID 1464 wrote to memory of 1128 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe 27 PID 1464 wrote to memory of 1128 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe 27 PID 1464 wrote to memory of 1128 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe 27 PID 1128 wrote to memory of 1248 1128 maybx.exe 7 PID 1128 wrote to memory of 1248 1128 maybx.exe 7 PID 1128 wrote to memory of 1248 1128 maybx.exe 7 PID 1128 wrote to memory of 1248 1128 maybx.exe 7 PID 1128 wrote to memory of 1248 1128 maybx.exe 7 PID 1128 wrote to memory of 1360 1128 maybx.exe 14 PID 1128 wrote to memory of 1360 1128 maybx.exe 14 PID 1128 wrote to memory of 1360 1128 maybx.exe 14 PID 1128 wrote to memory of 1360 1128 maybx.exe 14 PID 1128 wrote to memory of 1360 1128 maybx.exe 14 PID 1128 wrote to memory of 1392 1128 maybx.exe 13 PID 1128 wrote to memory of 1392 1128 maybx.exe 13 PID 1128 wrote to memory of 1392 1128 maybx.exe 13 PID 1128 wrote to memory of 1392 1128 maybx.exe 13 PID 1128 wrote to memory of 1392 1128 maybx.exe 13 PID 1128 wrote to memory of 1464 1128 maybx.exe 26 PID 1128 wrote to memory of 1464 1128 maybx.exe 26 PID 1128 wrote to memory of 1464 1128 maybx.exe 26 PID 1128 wrote to memory of 1464 1128 maybx.exe 26 PID 1128 wrote to memory of 1464 1128 maybx.exe 26 PID 1464 wrote to memory of 360 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe 28 PID 1464 wrote to memory of 360 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe 28 PID 1464 wrote to memory of 360 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe 28 PID 1464 wrote to memory of 360 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe 28 PID 1464 wrote to memory of 360 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe 28 PID 1464 wrote to memory of 360 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe 28 PID 1464 wrote to memory of 360 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe 28 PID 1464 wrote to memory of 360 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe 28 PID 1464 wrote to memory of 360 1464 afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe 28
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1248
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe"C:\Users\Admin\AppData\Local\Temp\afaa6cc4cfaf56d9dc58db5e3a2986d0141ba9cc6bdfc42c8a1f23decb9ff735.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Roaming\Ykiver\maybx.exe"C:\Users\Admin\AppData\Roaming\Ykiver\maybx.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1128
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\YOUFF70.bat"3⤵
- Deletes itself
PID:360
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD5bedd15eac9a49c9c17acf28e0b115151
SHA1ccbff023de81c0570e234c6bfe7dd4aa66df77b5
SHA2565990a9dcc5d243e9d2ed270914e51428f60f8f473aaa2efcef31a2d56d607f2a
SHA512a2ef08046fa9eed6b84d90593008f8b19097eb286d5485e1857e995a5919c01e7e11d1d62176a4f88391acf5819c897ca856745f63cbd7a80dceb744b60b8fc3
-
Filesize
308KB
MD58afbadaf9daebbe908da396aab613b38
SHA178a59905641ef8bb32f019b71ff1af5a954bbd40
SHA2560560277f9616b81a29d31dad284664819b1b67e97298876567f7d4967de57e43
SHA512daf5ab700d7d7a95ce37aeec549e767f8bfd4ec11b7e870aa4c1ad47440de402950d1f0ca979e39bed5ea1900f589c546a38a57d56df75a2c2eb82c7ecfbac87
-
Filesize
308KB
MD58afbadaf9daebbe908da396aab613b38
SHA178a59905641ef8bb32f019b71ff1af5a954bbd40
SHA2560560277f9616b81a29d31dad284664819b1b67e97298876567f7d4967de57e43
SHA512daf5ab700d7d7a95ce37aeec549e767f8bfd4ec11b7e870aa4c1ad47440de402950d1f0ca979e39bed5ea1900f589c546a38a57d56df75a2c2eb82c7ecfbac87
-
Filesize
308KB
MD58afbadaf9daebbe908da396aab613b38
SHA178a59905641ef8bb32f019b71ff1af5a954bbd40
SHA2560560277f9616b81a29d31dad284664819b1b67e97298876567f7d4967de57e43
SHA512daf5ab700d7d7a95ce37aeec549e767f8bfd4ec11b7e870aa4c1ad47440de402950d1f0ca979e39bed5ea1900f589c546a38a57d56df75a2c2eb82c7ecfbac87
-
Filesize
308KB
MD58afbadaf9daebbe908da396aab613b38
SHA178a59905641ef8bb32f019b71ff1af5a954bbd40
SHA2560560277f9616b81a29d31dad284664819b1b67e97298876567f7d4967de57e43
SHA512daf5ab700d7d7a95ce37aeec549e767f8bfd4ec11b7e870aa4c1ad47440de402950d1f0ca979e39bed5ea1900f589c546a38a57d56df75a2c2eb82c7ecfbac87