Analysis

  • max time kernel
    165s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2022 01:39

General

  • Target

    99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe

  • Size

    416KB

  • MD5

    338173dfd00cfa43f6978182ba69d6b0

  • SHA1

    5495a84a842beca91e1be7bd360cee440df0c467

  • SHA256

    99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da

  • SHA512

    8d632cc2e29244f1d3b617fe8a8c847237cca49c78ac4fa0c4ea404d3fb14e418e6676c0d54b16ff06d88e723c6c3064b398247527682bd11dd86f5facc1d3d7

  • SSDEEP

    6144:bvLxlRBLwCpiD4kXWUu3pmi9ITPNe6oZLKV9VZXDDP9xVDk:bvNlPwCpu44gmewN9gWDh

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe
    "C:\Users\Admin\AppData\Local\Temp\99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1668
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer Protected Mode
    • Modifies Internet Explorer Protected Mode Banner
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1256

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\EzcoYowij.dat

    Filesize

    273KB

    MD5

    d40ad083d38b788a4f0109a71df8c842

    SHA1

    e216e871888e9717b571952ea535ccbe10d9829f

    SHA256

    9c41d5a72c93f46b134f79ed15d99944340288e062faa56e3c8b5170109d9c8e

    SHA512

    db87477865db94563dcd38cae7e6352a4a9a8559530a19b6fe97385557102f36f5e0eb1a2c7455425b3511897da51c384f8e9c17554684cd3df9c9021911dde7

  • \ProgramData\EzcoYowij.dat

    Filesize

    273KB

    MD5

    d40ad083d38b788a4f0109a71df8c842

    SHA1

    e216e871888e9717b571952ea535ccbe10d9829f

    SHA256

    9c41d5a72c93f46b134f79ed15d99944340288e062faa56e3c8b5170109d9c8e

    SHA512

    db87477865db94563dcd38cae7e6352a4a9a8559530a19b6fe97385557102f36f5e0eb1a2c7455425b3511897da51c384f8e9c17554684cd3df9c9021911dde7

  • memory/1256-60-0x0000000002190000-0x00000000021DF000-memory.dmp

    Filesize

    316KB

  • memory/1256-67-0x0000000002190000-0x00000000021DF000-memory.dmp

    Filesize

    316KB

  • memory/1256-68-0x0000000002B40000-0x0000000002BA9000-memory.dmp

    Filesize

    420KB

  • memory/1668-54-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1668-56-0x0000000075241000-0x0000000075243000-memory.dmp

    Filesize

    8KB

  • memory/1668-58-0x0000000010000000-0x000000001002F000-memory.dmp

    Filesize

    188KB

  • memory/1668-65-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/1668-66-0x0000000010000000-0x0000000010054000-memory.dmp

    Filesize

    336KB

  • memory/1668-69-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1668-70-0x0000000010000000-0x000000001002F000-memory.dmp

    Filesize

    188KB