Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe
Resource
win10v2004-20220901-en
General
-
Target
f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe
-
Size
294KB
-
MD5
65badbe242878265bb6cfea347bda1c0
-
SHA1
0501845531ded9ee446cc33630546295db7eb88d
-
SHA256
f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0
-
SHA512
254c6517e71339979617658a83c72d710c7ed73fd82f1758e34442fd17e918ca9a7496f5846da8a0935d24ddba7eb5054cdbbb2c48cb65e138c9891d4b268c4b
-
SSDEEP
6144:ds2dMBPkWM7Un11uZuJ2kTDMo/hfP8y5fvPWdvMrpWUXFsQsY8MNgY3Fg8AZXC0y:dHdEsx7Un11PPfP8yspkrVsdGgUgxZCl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1116 koemv.exe -
Deletes itself 1 IoCs
pid Process 1556 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run koemv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Koemv = "C:\\Users\\Admin\\AppData\\Roaming\\Wiibxi\\koemv.exe" koemv.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 1556 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe 1116 koemv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1116 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe 27 PID 1492 wrote to memory of 1116 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe 27 PID 1492 wrote to memory of 1116 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe 27 PID 1492 wrote to memory of 1116 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe 27 PID 1116 wrote to memory of 1280 1116 koemv.exe 17 PID 1116 wrote to memory of 1280 1116 koemv.exe 17 PID 1116 wrote to memory of 1280 1116 koemv.exe 17 PID 1116 wrote to memory of 1280 1116 koemv.exe 17 PID 1116 wrote to memory of 1280 1116 koemv.exe 17 PID 1116 wrote to memory of 1396 1116 koemv.exe 16 PID 1116 wrote to memory of 1396 1116 koemv.exe 16 PID 1116 wrote to memory of 1396 1116 koemv.exe 16 PID 1116 wrote to memory of 1396 1116 koemv.exe 16 PID 1116 wrote to memory of 1396 1116 koemv.exe 16 PID 1116 wrote to memory of 1424 1116 koemv.exe 15 PID 1116 wrote to memory of 1424 1116 koemv.exe 15 PID 1116 wrote to memory of 1424 1116 koemv.exe 15 PID 1116 wrote to memory of 1424 1116 koemv.exe 15 PID 1116 wrote to memory of 1424 1116 koemv.exe 15 PID 1116 wrote to memory of 1492 1116 koemv.exe 26 PID 1116 wrote to memory of 1492 1116 koemv.exe 26 PID 1116 wrote to memory of 1492 1116 koemv.exe 26 PID 1116 wrote to memory of 1492 1116 koemv.exe 26 PID 1116 wrote to memory of 1492 1116 koemv.exe 26 PID 1492 wrote to memory of 1556 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe 28 PID 1492 wrote to memory of 1556 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe 28 PID 1492 wrote to memory of 1556 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe 28 PID 1492 wrote to memory of 1556 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe 28 PID 1492 wrote to memory of 1556 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe 28 PID 1492 wrote to memory of 1556 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe 28 PID 1492 wrote to memory of 1556 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe 28 PID 1492 wrote to memory of 1556 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe 28 PID 1492 wrote to memory of 1556 1492 f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe"C:\Users\Admin\AppData\Local\Temp\f8ab626ae9cbb86a1e9f9a1974a6b4034b5b528e0631895cde8ccb1a0fd49cf0.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Roaming\Wiibxi\koemv.exe"C:\Users\Admin\AppData\Roaming\Wiibxi\koemv.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1116
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\RDADFD1.bat"3⤵
- Deletes itself
PID:1556
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1396
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD53cb1f04e8caaf1f1babe8f52f7902ee3
SHA1ca0b89baca278d7f12044f2f3da9de92714ce3aa
SHA256459e835737b1cb866d574f03a018b4233ca3906709478c7d5327841bae5126d4
SHA512772c1d65c317e6ec8a5e66678ba51a9fd01d76d0b73b7f232b6c57e07152e437a9118d544fe65c803640186726eef06a7e75a31f0b332c171107020b819efe71
-
Filesize
294KB
MD5c5b3c51a03b2bc5640c1431a15e4f1a5
SHA16fbdf3628a9905d022a31f429d71294c62f53bdd
SHA25693961f5b4ac0ca1e0e929988db9ce10244d12e22c8c4d3d460ebbcd4115d1842
SHA512121f794d42e1c117be0da10a879332a15375b1be17d96fe803ddc625558411d130a604005ecdedef70d62f8760839737d76a7054218878bb258ca813ec1ee2b3
-
Filesize
294KB
MD5c5b3c51a03b2bc5640c1431a15e4f1a5
SHA16fbdf3628a9905d022a31f429d71294c62f53bdd
SHA25693961f5b4ac0ca1e0e929988db9ce10244d12e22c8c4d3d460ebbcd4115d1842
SHA512121f794d42e1c117be0da10a879332a15375b1be17d96fe803ddc625558411d130a604005ecdedef70d62f8760839737d76a7054218878bb258ca813ec1ee2b3
-
Filesize
294KB
MD5c5b3c51a03b2bc5640c1431a15e4f1a5
SHA16fbdf3628a9905d022a31f429d71294c62f53bdd
SHA25693961f5b4ac0ca1e0e929988db9ce10244d12e22c8c4d3d460ebbcd4115d1842
SHA512121f794d42e1c117be0da10a879332a15375b1be17d96fe803ddc625558411d130a604005ecdedef70d62f8760839737d76a7054218878bb258ca813ec1ee2b3
-
Filesize
294KB
MD5c5b3c51a03b2bc5640c1431a15e4f1a5
SHA16fbdf3628a9905d022a31f429d71294c62f53bdd
SHA25693961f5b4ac0ca1e0e929988db9ce10244d12e22c8c4d3d460ebbcd4115d1842
SHA512121f794d42e1c117be0da10a879332a15375b1be17d96fe803ddc625558411d130a604005ecdedef70d62f8760839737d76a7054218878bb258ca813ec1ee2b3