Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 23:00
Static task
static1
Behavioral task
behavioral1
Sample
487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe
Resource
win10v2004-20220812-en
General
-
Target
487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe
-
Size
299KB
-
MD5
a132be0619f7fea081a5c962e4f974dc
-
SHA1
d1ea32838d36f93ba04ad3ce53692a594265235f
-
SHA256
487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9
-
SHA512
3a9842d2d475b63af79e42860e95ebea3248806d2d5873d723d3b5a92966d99069347fac81546f4c0fe641c11be59b415d7b126426df28e8ed8fe73430bb3b36
-
SSDEEP
6144:xw5Wn/SGtXqT75YJN8TnAFe2laWx9Kx6dbHZFKrmxIHq8ChwDJrBMaI:aIftXw60EFR59KxybHjymWqbgBMa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 976 izyj.exe -
Deletes itself 1 IoCs
pid Process 1312 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run izyj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7BD94DA8-4FEF-AD4D-5225-887A4931AB67} = "C:\\Users\\Admin\\AppData\\Roaming\\Mewyi\\izyj.exe" izyj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1980 set thread context of 1312 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe 29 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe 976 izyj.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1980 wrote to memory of 976 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe 28 PID 1980 wrote to memory of 976 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe 28 PID 1980 wrote to memory of 976 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe 28 PID 1980 wrote to memory of 976 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe 28 PID 976 wrote to memory of 1276 976 izyj.exe 16 PID 976 wrote to memory of 1276 976 izyj.exe 16 PID 976 wrote to memory of 1276 976 izyj.exe 16 PID 976 wrote to memory of 1276 976 izyj.exe 16 PID 976 wrote to memory of 1276 976 izyj.exe 16 PID 976 wrote to memory of 1356 976 izyj.exe 15 PID 976 wrote to memory of 1356 976 izyj.exe 15 PID 976 wrote to memory of 1356 976 izyj.exe 15 PID 976 wrote to memory of 1356 976 izyj.exe 15 PID 976 wrote to memory of 1356 976 izyj.exe 15 PID 976 wrote to memory of 1404 976 izyj.exe 8 PID 976 wrote to memory of 1404 976 izyj.exe 8 PID 976 wrote to memory of 1404 976 izyj.exe 8 PID 976 wrote to memory of 1404 976 izyj.exe 8 PID 976 wrote to memory of 1404 976 izyj.exe 8 PID 976 wrote to memory of 1980 976 izyj.exe 24 PID 976 wrote to memory of 1980 976 izyj.exe 24 PID 976 wrote to memory of 1980 976 izyj.exe 24 PID 976 wrote to memory of 1980 976 izyj.exe 24 PID 976 wrote to memory of 1980 976 izyj.exe 24 PID 1980 wrote to memory of 1312 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe 29 PID 1980 wrote to memory of 1312 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe 29 PID 1980 wrote to memory of 1312 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe 29 PID 1980 wrote to memory of 1312 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe 29 PID 1980 wrote to memory of 1312 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe 29 PID 1980 wrote to memory of 1312 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe 29 PID 1980 wrote to memory of 1312 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe 29 PID 1980 wrote to memory of 1312 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe 29 PID 1980 wrote to memory of 1312 1980 487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe"C:\Users\Admin\AppData\Local\Temp\487043e29cf70efa780ecee31ad99437c2d1aa65ee5ed207c7c88182ea1a58f9.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Roaming\Mewyi\izyj.exe"C:\Users\Admin\AppData\Roaming\Mewyi\izyj.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:976
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp08ed59c4.bat"3⤵
- Deletes itself
PID:1312
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1356
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5cca359e23d03c6f76208451e1831538b
SHA19bc831f32c9fd822d37ef9a6c93d10f791ee3ccd
SHA25654dc406aaf9b51784aad0c4a14d5cd00d255eef832b9982bdbb219036cbcf629
SHA5128b217ec81429d281643202cdab3d53e5ee56683aceb470599368aa1615aafc878630f25efab6a35c672222731aafac0675396237a14ea2005aafe42b63dd1bba
-
Filesize
299KB
MD50be1e092ee5a64b153a41465cd86040d
SHA1fdf4be677fb04448eccd797c7945c3795629d692
SHA256940a4337f851342c1e7222f80eb523eaaccd311bfd7b3474445de58969dacb7d
SHA5126f64725eda35282e0370c7937972dfd87d595dc74c36e69192e18a36f3a8319abcc4070a9074f4035a2749fbabe3fc4f87cd1a8ad134966d3f77fbb38c7c832b
-
Filesize
299KB
MD50be1e092ee5a64b153a41465cd86040d
SHA1fdf4be677fb04448eccd797c7945c3795629d692
SHA256940a4337f851342c1e7222f80eb523eaaccd311bfd7b3474445de58969dacb7d
SHA5126f64725eda35282e0370c7937972dfd87d595dc74c36e69192e18a36f3a8319abcc4070a9074f4035a2749fbabe3fc4f87cd1a8ad134966d3f77fbb38c7c832b
-
Filesize
299KB
MD50be1e092ee5a64b153a41465cd86040d
SHA1fdf4be677fb04448eccd797c7945c3795629d692
SHA256940a4337f851342c1e7222f80eb523eaaccd311bfd7b3474445de58969dacb7d
SHA5126f64725eda35282e0370c7937972dfd87d595dc74c36e69192e18a36f3a8319abcc4070a9074f4035a2749fbabe3fc4f87cd1a8ad134966d3f77fbb38c7c832b
-
Filesize
299KB
MD50be1e092ee5a64b153a41465cd86040d
SHA1fdf4be677fb04448eccd797c7945c3795629d692
SHA256940a4337f851342c1e7222f80eb523eaaccd311bfd7b3474445de58969dacb7d
SHA5126f64725eda35282e0370c7937972dfd87d595dc74c36e69192e18a36f3a8319abcc4070a9074f4035a2749fbabe3fc4f87cd1a8ad134966d3f77fbb38c7c832b