Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe
Resource
win10v2004-20220812-en
General
-
Target
aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe
-
Size
246KB
-
MD5
46fde05dabc1ab5b496b9eab0ce75eb1
-
SHA1
17ee6a1974dc00ccc1be8f4b0f9d04373317b62a
-
SHA256
aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303
-
SHA512
27dc1258ec8bf7b4513ddd4badb12201eadfa1c94182a8312c426a1c4debf8b092c083f5fd5676ac0a64d910cfeb2e1ac154e1d93c6c536ef0950f34914519ea
-
SSDEEP
6144:E9AcSqn006eGoxcyvJHugXYXh5unBqUAaB5C2PtlYZd:Ef6eGoqQ1I7m/TPgH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1112 ysen.exe 904 ysen.exe -
Deletes itself 1 IoCs
pid Process 332 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 952 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 952 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ysen.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Fyfin\\ysen.exe" explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1736 set thread context of 952 1736 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 28 PID 1112 set thread context of 904 1112 ysen.exe 30 -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\742540C9-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1736 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 1736 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 1112 ysen.exe 1112 ysen.exe 1740 explorer.exe 904 ysen.exe 904 ysen.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 952 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe Token: SeManageVolumePrivilege 1376 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1376 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1376 WinMail.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1736 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 1736 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 1112 ysen.exe 1112 ysen.exe 1376 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1736 wrote to memory of 952 1736 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 28 PID 1736 wrote to memory of 952 1736 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 28 PID 1736 wrote to memory of 952 1736 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 28 PID 1736 wrote to memory of 952 1736 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 28 PID 1736 wrote to memory of 952 1736 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 28 PID 1736 wrote to memory of 952 1736 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 28 PID 1736 wrote to memory of 952 1736 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 28 PID 1736 wrote to memory of 952 1736 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 28 PID 1736 wrote to memory of 952 1736 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 28 PID 952 wrote to memory of 1112 952 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 29 PID 952 wrote to memory of 1112 952 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 29 PID 952 wrote to memory of 1112 952 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 29 PID 952 wrote to memory of 1112 952 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 29 PID 1112 wrote to memory of 904 1112 ysen.exe 30 PID 1112 wrote to memory of 904 1112 ysen.exe 30 PID 1112 wrote to memory of 904 1112 ysen.exe 30 PID 1112 wrote to memory of 904 1112 ysen.exe 30 PID 1112 wrote to memory of 904 1112 ysen.exe 30 PID 1112 wrote to memory of 904 1112 ysen.exe 30 PID 1112 wrote to memory of 904 1112 ysen.exe 30 PID 1112 wrote to memory of 904 1112 ysen.exe 30 PID 1112 wrote to memory of 904 1112 ysen.exe 30 PID 952 wrote to memory of 332 952 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 31 PID 952 wrote to memory of 332 952 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 31 PID 952 wrote to memory of 332 952 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 31 PID 952 wrote to memory of 332 952 aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe 31 PID 904 wrote to memory of 1740 904 ysen.exe 33 PID 904 wrote to memory of 1740 904 ysen.exe 33 PID 904 wrote to memory of 1740 904 ysen.exe 33 PID 904 wrote to memory of 1740 904 ysen.exe 33 PID 904 wrote to memory of 1740 904 ysen.exe 33 PID 904 wrote to memory of 1740 904 ysen.exe 33 PID 904 wrote to memory of 1740 904 ysen.exe 33 PID 904 wrote to memory of 1740 904 ysen.exe 33 PID 904 wrote to memory of 1740 904 ysen.exe 33 PID 1740 wrote to memory of 1300 1740 explorer.exe 7 PID 1740 wrote to memory of 1300 1740 explorer.exe 7 PID 1740 wrote to memory of 1300 1740 explorer.exe 7 PID 1740 wrote to memory of 1300 1740 explorer.exe 7 PID 1740 wrote to memory of 1300 1740 explorer.exe 7 PID 1740 wrote to memory of 1360 1740 explorer.exe 15 PID 1740 wrote to memory of 1360 1740 explorer.exe 15 PID 1740 wrote to memory of 1360 1740 explorer.exe 15 PID 1740 wrote to memory of 1360 1740 explorer.exe 15 PID 1740 wrote to memory of 1360 1740 explorer.exe 15 PID 1740 wrote to memory of 1432 1740 explorer.exe 14 PID 1740 wrote to memory of 1432 1740 explorer.exe 14 PID 1740 wrote to memory of 1432 1740 explorer.exe 14 PID 1740 wrote to memory of 1432 1740 explorer.exe 14 PID 1740 wrote to memory of 1432 1740 explorer.exe 14 PID 1740 wrote to memory of 904 1740 explorer.exe 30 PID 1740 wrote to memory of 904 1740 explorer.exe 30 PID 1740 wrote to memory of 904 1740 explorer.exe 30 PID 1740 wrote to memory of 904 1740 explorer.exe 30 PID 1740 wrote to memory of 904 1740 explorer.exe 30 PID 904 wrote to memory of 1376 904 ysen.exe 34 PID 904 wrote to memory of 1376 904 ysen.exe 34 PID 904 wrote to memory of 1376 904 ysen.exe 34 PID 904 wrote to memory of 1376 904 ysen.exe 34 PID 904 wrote to memory of 1376 904 ysen.exe 34 PID 1740 wrote to memory of 1136 1740 explorer.exe 35 PID 1740 wrote to memory of 1136 1740 explorer.exe 35 PID 1740 wrote to memory of 1136 1740 explorer.exe 35 PID 1740 wrote to memory of 1136 1740 explorer.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1300
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe"C:\Users\Admin\AppData\Local\Temp\aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exeC:\Users\Admin\AppData\Local\Temp\aa0d96982544e9179d0f2c4ed89977f1c7a4c5c68ef1df38f36cc31f6315d303.exe3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Roaming\Fyfin\ysen.exe"C:\Users\Admin\AppData\Roaming\Fyfin\ysen.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Roaming\Fyfin\ysen.exeC:\Users\Admin\AppData\Roaming\Fyfin\ysen.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"6⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpff691bb4.bat"4⤵
- Deletes itself
PID:332
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1360
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1376
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1136
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1572
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5e8386d556a9b16527d6be9a5003859b0
SHA1b5fd84d340642a33158203534efb1bfa22a59bf0
SHA256c3c703e6e6616004d72fc9050f93277fe0b7359dba0c4b0bd02e70a12d0539ac
SHA5122985768337fba0e3f207fc94b63e19170b9383320921c3b2484497109641ac62ca8f0c64da45fcf4d6813662ce06bf395b8233eecab4931734ffcc9544f58e53
-
Filesize
246KB
MD500a79cdc4860e727513f694a6b11f286
SHA174d4ab7406a10cba4b92db3dcc20009d43e01890
SHA256c6a8552f0e0137e1c5ea117f132c95519f14240208221f9987245867af58e7b8
SHA512dbdbc955f6ee8eba3433ec9c01c9c82e57a9aa4145d117b1f8050af5c7227cf8200e239f74a276587012a1abf9028bb7a2912e86f460541c5ca0e4fdc2c0ffbe
-
Filesize
246KB
MD500a79cdc4860e727513f694a6b11f286
SHA174d4ab7406a10cba4b92db3dcc20009d43e01890
SHA256c6a8552f0e0137e1c5ea117f132c95519f14240208221f9987245867af58e7b8
SHA512dbdbc955f6ee8eba3433ec9c01c9c82e57a9aa4145d117b1f8050af5c7227cf8200e239f74a276587012a1abf9028bb7a2912e86f460541c5ca0e4fdc2c0ffbe
-
Filesize
246KB
MD500a79cdc4860e727513f694a6b11f286
SHA174d4ab7406a10cba4b92db3dcc20009d43e01890
SHA256c6a8552f0e0137e1c5ea117f132c95519f14240208221f9987245867af58e7b8
SHA512dbdbc955f6ee8eba3433ec9c01c9c82e57a9aa4145d117b1f8050af5c7227cf8200e239f74a276587012a1abf9028bb7a2912e86f460541c5ca0e4fdc2c0ffbe
-
Filesize
246KB
MD500a79cdc4860e727513f694a6b11f286
SHA174d4ab7406a10cba4b92db3dcc20009d43e01890
SHA256c6a8552f0e0137e1c5ea117f132c95519f14240208221f9987245867af58e7b8
SHA512dbdbc955f6ee8eba3433ec9c01c9c82e57a9aa4145d117b1f8050af5c7227cf8200e239f74a276587012a1abf9028bb7a2912e86f460541c5ca0e4fdc2c0ffbe
-
Filesize
246KB
MD500a79cdc4860e727513f694a6b11f286
SHA174d4ab7406a10cba4b92db3dcc20009d43e01890
SHA256c6a8552f0e0137e1c5ea117f132c95519f14240208221f9987245867af58e7b8
SHA512dbdbc955f6ee8eba3433ec9c01c9c82e57a9aa4145d117b1f8050af5c7227cf8200e239f74a276587012a1abf9028bb7a2912e86f460541c5ca0e4fdc2c0ffbe