Analysis
-
max time kernel
152s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 02:11
Static task
static1
Behavioral task
behavioral1
Sample
431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe
Resource
win10v2004-20220901-en
General
-
Target
431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe
-
Size
290KB
-
MD5
371b32e34527604a1694fb37e2caa130
-
SHA1
65d7abecdd1c1f167801fcf6d0dd6d4d70141972
-
SHA256
431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f
-
SHA512
e9b1c4d69c602b7be4b817e182c2f9f6f8c8a2227bfc2cd906fa3666a750b4fd6559016f9b4bc30533cc5b73f6369fe81e634941db06b9e61b84e97b467749ad
-
SSDEEP
6144:MemRlZB1SrW7cX22lMmDTxX8PMM7qJ3Ys/UCJXFIym4OZ0FSbGq:MzRHeW7cX/i+Td2MMl8X1lOZYS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 960 ofys.exe -
Deletes itself 1 IoCs
pid Process 1068 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\Currentversion\Run ofys.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\Currentversion\Run ofys.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Akfeev = "C:\\Users\\Admin\\AppData\\Roaming\\Gyacit\\ofys.exe" ofys.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 1068 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Privacy 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\30C21C64-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe 960 ofys.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeSecurityPrivilege 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe Token: SeSecurityPrivilege 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe Token: SeSecurityPrivilege 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe Token: SeSecurityPrivilege 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe Token: SeSecurityPrivilege 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe Token: SeSecurityPrivilege 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe Token: SeSecurityPrivilege 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe Token: SeSecurityPrivilege 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe Token: SeSecurityPrivilege 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe Token: SeSecurityPrivilege 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe Token: SeSecurityPrivilege 1068 cmd.exe Token: SeSecurityPrivilege 1068 cmd.exe Token: SeSecurityPrivilege 1068 cmd.exe Token: SeSecurityPrivilege 1068 cmd.exe Token: SeSecurityPrivilege 1068 cmd.exe Token: SeManageVolumePrivilege 1508 WinMail.exe Token: SeSecurityPrivilege 1068 cmd.exe Token: SeSecurityPrivilege 1068 cmd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1508 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1508 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1508 WinMail.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 960 ofys.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1632 wrote to memory of 960 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 28 PID 1632 wrote to memory of 960 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 28 PID 1632 wrote to memory of 960 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 28 PID 1632 wrote to memory of 960 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 28 PID 960 wrote to memory of 1128 960 ofys.exe 20 PID 960 wrote to memory of 1128 960 ofys.exe 20 PID 960 wrote to memory of 1128 960 ofys.exe 20 PID 960 wrote to memory of 1128 960 ofys.exe 20 PID 960 wrote to memory of 1128 960 ofys.exe 20 PID 960 wrote to memory of 1188 960 ofys.exe 11 PID 960 wrote to memory of 1188 960 ofys.exe 11 PID 960 wrote to memory of 1188 960 ofys.exe 11 PID 960 wrote to memory of 1188 960 ofys.exe 11 PID 960 wrote to memory of 1188 960 ofys.exe 11 PID 960 wrote to memory of 1216 960 ofys.exe 19 PID 960 wrote to memory of 1216 960 ofys.exe 19 PID 960 wrote to memory of 1216 960 ofys.exe 19 PID 960 wrote to memory of 1216 960 ofys.exe 19 PID 960 wrote to memory of 1216 960 ofys.exe 19 PID 960 wrote to memory of 1632 960 ofys.exe 14 PID 960 wrote to memory of 1632 960 ofys.exe 14 PID 960 wrote to memory of 1632 960 ofys.exe 14 PID 960 wrote to memory of 1632 960 ofys.exe 14 PID 960 wrote to memory of 1632 960 ofys.exe 14 PID 1632 wrote to memory of 1068 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 29 PID 1632 wrote to memory of 1068 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 29 PID 1632 wrote to memory of 1068 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 29 PID 1632 wrote to memory of 1068 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 29 PID 1632 wrote to memory of 1068 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 29 PID 1632 wrote to memory of 1068 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 29 PID 1632 wrote to memory of 1068 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 29 PID 1632 wrote to memory of 1068 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 29 PID 1632 wrote to memory of 1068 1632 431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe 29 PID 960 wrote to memory of 1688 960 ofys.exe 30 PID 960 wrote to memory of 1688 960 ofys.exe 30 PID 960 wrote to memory of 1688 960 ofys.exe 30 PID 960 wrote to memory of 1688 960 ofys.exe 30 PID 960 wrote to memory of 1688 960 ofys.exe 30 PID 960 wrote to memory of 1592 960 ofys.exe 31 PID 960 wrote to memory of 1592 960 ofys.exe 31 PID 960 wrote to memory of 1592 960 ofys.exe 31 PID 960 wrote to memory of 1592 960 ofys.exe 31 PID 960 wrote to memory of 1592 960 ofys.exe 31 PID 960 wrote to memory of 1508 960 ofys.exe 32 PID 960 wrote to memory of 1508 960 ofys.exe 32 PID 960 wrote to memory of 1508 960 ofys.exe 32 PID 960 wrote to memory of 1508 960 ofys.exe 32 PID 960 wrote to memory of 1508 960 ofys.exe 32 PID 960 wrote to memory of 1616 960 ofys.exe 33 PID 960 wrote to memory of 1616 960 ofys.exe 33 PID 960 wrote to memory of 1616 960 ofys.exe 33 PID 960 wrote to memory of 1616 960 ofys.exe 33 PID 960 wrote to memory of 1616 960 ofys.exe 33 PID 960 wrote to memory of 1032 960 ofys.exe 34 PID 960 wrote to memory of 1032 960 ofys.exe 34 PID 960 wrote to memory of 1032 960 ofys.exe 34 PID 960 wrote to memory of 1032 960 ofys.exe 34 PID 960 wrote to memory of 1032 960 ofys.exe 34 PID 960 wrote to memory of 2044 960 ofys.exe 35 PID 960 wrote to memory of 2044 960 ofys.exe 35 PID 960 wrote to memory of 2044 960 ofys.exe 35 PID 960 wrote to memory of 2044 960 ofys.exe 35 PID 960 wrote to memory of 2044 960 ofys.exe 35 PID 960 wrote to memory of 268 960 ofys.exe 36
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe"C:\Users\Admin\AppData\Local\Temp\431bcbcc1b02b884a673b40b10d1c4351bdcc2f8acb5f16c85e032c7d618625f.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Roaming\Gyacit\ofys.exe"C:\Users\Admin\AppData\Roaming\Gyacit\ofys.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:960
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpae0957ca.bat"2⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1688
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "816473285-1320602459-13629735751492792338-1269228612-794440937-1358572783746251807"1⤵PID:1592
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1508
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1616
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1032
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2044
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:268
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2024
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5e433d69b9c88d292b92a7a38e2570f36
SHA13d27f56a8c29faef2e9a0fb9c934188797cb0d9a
SHA25694948d7b36f0c06ba19932f207d31dc485701c571d5e9de5354085815ede8ca6
SHA512eab0dfad5860ed9d821d54ba5e215f6d2c26679a56b5a696f37de740977d004538357c1cd86bd2891ab4b20d5b708741c75c1162fcde65a9396f0de3eb9e454e
-
Filesize
290KB
MD57531d30df02290f426e962fcb880b63d
SHA1a75f16be3340bceda5e36cb4c31553a25e471d53
SHA256c9f41dbcd8c43a5b5bc60a8a0822ade5b9828a992e7b004acbb08e44e5d9ad33
SHA5120aff013a4f98f3207fa80846cb8d0177a5b2bed28d9f956a1a0fb07ba415942c9e75ee81ac5148edc073caa2232426c9a21b73f45102697890f15b5f33da6636
-
Filesize
290KB
MD57531d30df02290f426e962fcb880b63d
SHA1a75f16be3340bceda5e36cb4c31553a25e471d53
SHA256c9f41dbcd8c43a5b5bc60a8a0822ade5b9828a992e7b004acbb08e44e5d9ad33
SHA5120aff013a4f98f3207fa80846cb8d0177a5b2bed28d9f956a1a0fb07ba415942c9e75ee81ac5148edc073caa2232426c9a21b73f45102697890f15b5f33da6636
-
Filesize
4KB
MD5e8391743fef8e604541888b74484bafc
SHA19fb7612c25f1a9a483f1778d92890eef010c7907
SHA256c073a7340ce6847721b160150eb0c5571f7990566638079635df2619acb7e0ea
SHA512e9978351ae6b804ab707e06753bcaf950b74a31167da7b52dfa906ba9587edf7788118df9b282414ead5256d530180d240b2067af3c8ee1e6ab9078b3ab4eacd
-
Filesize
4KB
MD51a181cc120caead8cfcb54291be10a59
SHA1516bf62e2ee1b8cba0b1451285f9145ad4f93015
SHA256ec08aa7c252e13048501fc120d3d46b4605f8424121ba13774189faa26038a71
SHA512d6415e7ccd3e017b62f579cb32f955887fb2ae34ddc603cd1522eab8a1ce90c1e86222340c9c77f1b321f6670b27c66cda6242067e5cc2d44230b72b59bf3220
-
Filesize
290KB
MD57531d30df02290f426e962fcb880b63d
SHA1a75f16be3340bceda5e36cb4c31553a25e471d53
SHA256c9f41dbcd8c43a5b5bc60a8a0822ade5b9828a992e7b004acbb08e44e5d9ad33
SHA5120aff013a4f98f3207fa80846cb8d0177a5b2bed28d9f956a1a0fb07ba415942c9e75ee81ac5148edc073caa2232426c9a21b73f45102697890f15b5f33da6636
-
Filesize
290KB
MD57531d30df02290f426e962fcb880b63d
SHA1a75f16be3340bceda5e36cb4c31553a25e471d53
SHA256c9f41dbcd8c43a5b5bc60a8a0822ade5b9828a992e7b004acbb08e44e5d9ad33
SHA5120aff013a4f98f3207fa80846cb8d0177a5b2bed28d9f956a1a0fb07ba415942c9e75ee81ac5148edc073caa2232426c9a21b73f45102697890f15b5f33da6636