Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe
Resource
win10v2004-20220812-en
General
-
Target
e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe
-
Size
308KB
-
MD5
6ff9cace5b4728a1f133ee429a26e3d0
-
SHA1
b2120e6d1e1c646f0300c11fe91a88ac8bac1187
-
SHA256
e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d
-
SHA512
cd28d2f4cd60307f5bab031a464d8a12eb0dc6f895515e0e54c03bfcb8c8a51e30673c523727921f875c5f6e333ec7159921c211308b82be6fdbf91cd0dfb648
-
SSDEEP
6144:I2Cu91FMUJi/wD7s63aPMrl5jS9NwZRElbz6MK5VuakszsrbQ0qAbCv:7Cu9gUxo6eMrl5owZaliQs2b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1128 resaj.exe -
Deletes itself 1 IoCs
pid Process 924 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run resaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\{CB118568-7F59-AD4D-CD9C-5E5DE9C17D40} = "C:\\Users\\Admin\\AppData\\Roaming\\Ykxada\\resaj.exe" resaj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1448 set thread context of 924 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe 1128 resaj.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1128 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe 27 PID 1448 wrote to memory of 1128 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe 27 PID 1448 wrote to memory of 1128 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe 27 PID 1448 wrote to memory of 1128 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe 27 PID 1128 wrote to memory of 1248 1128 resaj.exe 16 PID 1128 wrote to memory of 1248 1128 resaj.exe 16 PID 1128 wrote to memory of 1248 1128 resaj.exe 16 PID 1128 wrote to memory of 1248 1128 resaj.exe 16 PID 1128 wrote to memory of 1248 1128 resaj.exe 16 PID 1128 wrote to memory of 1360 1128 resaj.exe 9 PID 1128 wrote to memory of 1360 1128 resaj.exe 9 PID 1128 wrote to memory of 1360 1128 resaj.exe 9 PID 1128 wrote to memory of 1360 1128 resaj.exe 9 PID 1128 wrote to memory of 1360 1128 resaj.exe 9 PID 1128 wrote to memory of 1392 1128 resaj.exe 15 PID 1128 wrote to memory of 1392 1128 resaj.exe 15 PID 1128 wrote to memory of 1392 1128 resaj.exe 15 PID 1128 wrote to memory of 1392 1128 resaj.exe 15 PID 1128 wrote to memory of 1392 1128 resaj.exe 15 PID 1128 wrote to memory of 1448 1128 resaj.exe 26 PID 1128 wrote to memory of 1448 1128 resaj.exe 26 PID 1128 wrote to memory of 1448 1128 resaj.exe 26 PID 1128 wrote to memory of 1448 1128 resaj.exe 26 PID 1128 wrote to memory of 1448 1128 resaj.exe 26 PID 1448 wrote to memory of 924 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe 28 PID 1448 wrote to memory of 924 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe 28 PID 1448 wrote to memory of 924 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe 28 PID 1448 wrote to memory of 924 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe 28 PID 1448 wrote to memory of 924 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe 28 PID 1448 wrote to memory of 924 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe 28 PID 1448 wrote to memory of 924 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe 28 PID 1448 wrote to memory of 924 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe 28 PID 1448 wrote to memory of 924 1448 e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe 28
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1360
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe"C:\Users\Admin\AppData\Local\Temp\e8310fbd5227eeed04a4f144b2148a72994a706188473cd1c1ffa388b9e1475d.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Roaming\Ykxada\resaj.exe"C:\Users\Admin\AppData\Roaming\Ykxada\resaj.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1128
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp98b9c966.bat"3⤵
- Deletes itself
PID:924
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1248
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5851a5654faf638ddeb17a91ff1ab3afa
SHA11c37d389b0e15253968b688d557b06f540d1681a
SHA2568730992331e5d2b28e04087c6409f5778f68bb230ea4c2b1107bcf5e7e15e355
SHA51284b7843c5b6a065700f50b53795664bf8c41f08cf3bbf280837850714d8d7d0c4448adae3c02c8cfb8e1a99dfb0d340d69e9ffbf680cb00b15af5eff18e96330
-
Filesize
308KB
MD5a85392253e95dfaa701c81e4eba25d51
SHA136ca1024ed97f10fe88383d7d8e94ea4d1aa02fb
SHA25604e5dd4b669259ea9c35a93183de4cdfe5c4c1a666448c5961dd70a77d9aab1a
SHA512da550801001ece3ac6f726048ac60ce9188b4112c6c2b8b1cccc104c076f8b6777a8f405a8ecfcc8e1cd4f3d8fa73be4aca3715b2235eae9bbc634d66be81d45
-
Filesize
308KB
MD5a85392253e95dfaa701c81e4eba25d51
SHA136ca1024ed97f10fe88383d7d8e94ea4d1aa02fb
SHA25604e5dd4b669259ea9c35a93183de4cdfe5c4c1a666448c5961dd70a77d9aab1a
SHA512da550801001ece3ac6f726048ac60ce9188b4112c6c2b8b1cccc104c076f8b6777a8f405a8ecfcc8e1cd4f3d8fa73be4aca3715b2235eae9bbc634d66be81d45
-
Filesize
308KB
MD5a85392253e95dfaa701c81e4eba25d51
SHA136ca1024ed97f10fe88383d7d8e94ea4d1aa02fb
SHA25604e5dd4b669259ea9c35a93183de4cdfe5c4c1a666448c5961dd70a77d9aab1a
SHA512da550801001ece3ac6f726048ac60ce9188b4112c6c2b8b1cccc104c076f8b6777a8f405a8ecfcc8e1cd4f3d8fa73be4aca3715b2235eae9bbc634d66be81d45
-
Filesize
308KB
MD5a85392253e95dfaa701c81e4eba25d51
SHA136ca1024ed97f10fe88383d7d8e94ea4d1aa02fb
SHA25604e5dd4b669259ea9c35a93183de4cdfe5c4c1a666448c5961dd70a77d9aab1a
SHA512da550801001ece3ac6f726048ac60ce9188b4112c6c2b8b1cccc104c076f8b6777a8f405a8ecfcc8e1cd4f3d8fa73be4aca3715b2235eae9bbc634d66be81d45