Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 13:46
Behavioral task
behavioral1
Sample
3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe
Resource
win10v2004-20220901-en
General
-
Target
3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe
-
Size
222KB
-
MD5
6396fe234920a22a1484758ccd00fba0
-
SHA1
cec8df87025f0d1e94d70a5f6ae00e19b810c4b4
-
SHA256
3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17
-
SHA512
06b7649f7af54df42cde18e64ab15036887a4581b0666ab7bf50b6a3b7887dbe4205044c882427119c3849317a2985117ca34f4c2c8b79046dfe9be8bd8ae843
-
SSDEEP
6144:WI8ujnboSeL3WexPtoPYStiAfCeNU7nyREO46IRHKbEp:J8uLboSeLWGsdZNWqgp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 824 xyiq.exe -
resource yara_rule behavioral1/files/0x000a000000012752-57.dat upx behavioral1/files/0x000a000000012752-58.dat upx behavioral1/files/0x000a000000012752-60.dat upx behavioral1/files/0x000a000000012752-62.dat upx -
Deletes itself 1 IoCs
pid Process 856 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\Currentversion\Run xyiq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\Currentversion\Run xyiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Xuexry = "C:\\Users\\Admin\\AppData\\Roaming\\Orhog\\xyiq.exe" xyiq.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1408 set thread context of 856 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\3F4F6893-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe 824 xyiq.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeSecurityPrivilege 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe Token: SeSecurityPrivilege 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe Token: SeSecurityPrivilege 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe Token: SeSecurityPrivilege 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe Token: SeSecurityPrivilege 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe Token: SeSecurityPrivilege 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe Token: SeSecurityPrivilege 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe Token: SeSecurityPrivilege 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe Token: SeSecurityPrivilege 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe Token: SeSecurityPrivilege 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe Token: SeManageVolumePrivilege 900 WinMail.exe Token: SeSecurityPrivilege 856 cmd.exe Token: SeSecurityPrivilege 856 cmd.exe Token: SeSecurityPrivilege 856 cmd.exe Token: SeSecurityPrivilege 856 cmd.exe Token: SeSecurityPrivilege 856 cmd.exe Token: SeSecurityPrivilege 856 cmd.exe Token: SeSecurityPrivilege 856 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 900 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1408 wrote to memory of 824 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe 26 PID 1408 wrote to memory of 824 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe 26 PID 1408 wrote to memory of 824 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe 26 PID 1408 wrote to memory of 824 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe 26 PID 824 wrote to memory of 1128 824 xyiq.exe 17 PID 824 wrote to memory of 1128 824 xyiq.exe 17 PID 824 wrote to memory of 1128 824 xyiq.exe 17 PID 824 wrote to memory of 1128 824 xyiq.exe 17 PID 824 wrote to memory of 1128 824 xyiq.exe 17 PID 824 wrote to memory of 1220 824 xyiq.exe 16 PID 824 wrote to memory of 1220 824 xyiq.exe 16 PID 824 wrote to memory of 1220 824 xyiq.exe 16 PID 824 wrote to memory of 1220 824 xyiq.exe 16 PID 824 wrote to memory of 1220 824 xyiq.exe 16 PID 824 wrote to memory of 1272 824 xyiq.exe 11 PID 824 wrote to memory of 1272 824 xyiq.exe 11 PID 824 wrote to memory of 1272 824 xyiq.exe 11 PID 824 wrote to memory of 1272 824 xyiq.exe 11 PID 824 wrote to memory of 1272 824 xyiq.exe 11 PID 824 wrote to memory of 1408 824 xyiq.exe 25 PID 824 wrote to memory of 1408 824 xyiq.exe 25 PID 824 wrote to memory of 1408 824 xyiq.exe 25 PID 824 wrote to memory of 1408 824 xyiq.exe 25 PID 824 wrote to memory of 1408 824 xyiq.exe 25 PID 824 wrote to memory of 900 824 xyiq.exe 27 PID 824 wrote to memory of 900 824 xyiq.exe 27 PID 824 wrote to memory of 900 824 xyiq.exe 27 PID 824 wrote to memory of 900 824 xyiq.exe 27 PID 824 wrote to memory of 900 824 xyiq.exe 27 PID 1408 wrote to memory of 856 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe 28 PID 1408 wrote to memory of 856 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe 28 PID 1408 wrote to memory of 856 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe 28 PID 1408 wrote to memory of 856 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe 28 PID 1408 wrote to memory of 856 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe 28 PID 1408 wrote to memory of 856 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe 28 PID 1408 wrote to memory of 856 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe 28 PID 1408 wrote to memory of 856 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe 28 PID 1408 wrote to memory of 856 1408 3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe 28 PID 824 wrote to memory of 556 824 xyiq.exe 29 PID 824 wrote to memory of 556 824 xyiq.exe 29 PID 824 wrote to memory of 556 824 xyiq.exe 29 PID 824 wrote to memory of 556 824 xyiq.exe 29 PID 824 wrote to memory of 556 824 xyiq.exe 29 PID 824 wrote to memory of 1848 824 xyiq.exe 30 PID 824 wrote to memory of 1848 824 xyiq.exe 30 PID 824 wrote to memory of 1848 824 xyiq.exe 30 PID 824 wrote to memory of 1848 824 xyiq.exe 30 PID 824 wrote to memory of 1848 824 xyiq.exe 30 PID 824 wrote to memory of 1800 824 xyiq.exe 31 PID 824 wrote to memory of 1800 824 xyiq.exe 31 PID 824 wrote to memory of 1800 824 xyiq.exe 31 PID 824 wrote to memory of 1800 824 xyiq.exe 31 PID 824 wrote to memory of 1800 824 xyiq.exe 31 PID 824 wrote to memory of 1796 824 xyiq.exe 32 PID 824 wrote to memory of 1796 824 xyiq.exe 32 PID 824 wrote to memory of 1796 824 xyiq.exe 32 PID 824 wrote to memory of 1796 824 xyiq.exe 32 PID 824 wrote to memory of 1796 824 xyiq.exe 32 PID 824 wrote to memory of 1136 824 xyiq.exe 33 PID 824 wrote to memory of 1136 824 xyiq.exe 33 PID 824 wrote to memory of 1136 824 xyiq.exe 33 PID 824 wrote to memory of 1136 824 xyiq.exe 33 PID 824 wrote to memory of 1136 824 xyiq.exe 33 PID 824 wrote to memory of 1736 824 xyiq.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe"C:\Users\Admin\AppData\Local\Temp\3aa39087540f43ff64e3cc720c1a457c6973cbf7bd3b65f58a8665234f489b17.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Roaming\Orhog\xyiq.exe"C:\Users\Admin\AppData\Roaming\Orhog\xyiq.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:824
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp20ea406b.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1220
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:900
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:556
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1847995657-17564191599973015801259005137-1909834138540077682891479965-1291545244"1⤵PID:1848
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1800
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1796
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1136
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1736
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD54de36e52b7af9399aa56b4e90a2e5b00
SHA1564ab190bfac7975f09efb84b745ee825dfbf913
SHA256da4d014b3d0138dd072870e6a5ac70e3d5bb6ed768d159f3c5ebc1d5a6bdc0fd
SHA512365f0d61040fdb2fb1d9f5d2784ed619d36cee5f6f34f4985c8a19f96104f5cf1bcbb20cc6e0078dd866abf632cabff605810d653a2348c475b3c2253a96e079
-
Filesize
4KB
MD57df5fc1e37c455d6aba9a82f8c788984
SHA14886b3db69f0c711f2ae0679c12494ead69f8f85
SHA25693d68d289385293c2a09c60df5fb087f31990c7ee9bd3f580345ddce6e629e07
SHA512d66cc7831027786106ed184df37969e2312a6e39c7802bb07118557d3ebcacfb0d6f36854a578f3fca7ee330ef8f944d1e115268fd1a4ef31d97866d701569de
-
Filesize
222KB
MD5918732b643666f32811f535a52976ea3
SHA1ee625733a4aae5f910f4ee8627e21904c34c1a8d
SHA25605a6ae8ee4f515af5f37dcb2fbf2de0c71e0952509b184d5d9781333abd26089
SHA5121052b50bd359cd77d325510ecb1c4461bdf76caf0ddf5acd2655266effa6886536b9c37a47b202ee5b06549986171e27f9129d6ae72409d3fa910620603794aa
-
Filesize
222KB
MD5918732b643666f32811f535a52976ea3
SHA1ee625733a4aae5f910f4ee8627e21904c34c1a8d
SHA25605a6ae8ee4f515af5f37dcb2fbf2de0c71e0952509b184d5d9781333abd26089
SHA5121052b50bd359cd77d325510ecb1c4461bdf76caf0ddf5acd2655266effa6886536b9c37a47b202ee5b06549986171e27f9129d6ae72409d3fa910620603794aa
-
Filesize
222KB
MD5918732b643666f32811f535a52976ea3
SHA1ee625733a4aae5f910f4ee8627e21904c34c1a8d
SHA25605a6ae8ee4f515af5f37dcb2fbf2de0c71e0952509b184d5d9781333abd26089
SHA5121052b50bd359cd77d325510ecb1c4461bdf76caf0ddf5acd2655266effa6886536b9c37a47b202ee5b06549986171e27f9129d6ae72409d3fa910620603794aa
-
Filesize
222KB
MD5918732b643666f32811f535a52976ea3
SHA1ee625733a4aae5f910f4ee8627e21904c34c1a8d
SHA25605a6ae8ee4f515af5f37dcb2fbf2de0c71e0952509b184d5d9781333abd26089
SHA5121052b50bd359cd77d325510ecb1c4461bdf76caf0ddf5acd2655266effa6886536b9c37a47b202ee5b06549986171e27f9129d6ae72409d3fa910620603794aa