Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 23:02
Static task
static1
Behavioral task
behavioral1
Sample
44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe
Resource
win10v2004-20220901-en
General
-
Target
44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe
-
Size
305KB
-
MD5
a11c8b82f008c0170f71445cd85ac740
-
SHA1
9660b1325b9a33680d921d00c45aa9fa42c3cb48
-
SHA256
44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59
-
SHA512
38906b54df6b54e2740fa8c450240e6c8fa2c3f7a27b9d5cf8ce4b85c1dfe16455b8489fc69c7907c4f25497abcff5f01019f1671a410e1625cfa697090c1d91
-
SSDEEP
3072:XvVQD8/32kHMel6XewWpTGcIdmxX8XbBVtosPKCwt6ufdcp0qKFyD0u+W+CyDGH5:/Q8/32X1ywmxsNKC0hdvFyIuQSynx+r
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1688 voryi.exe -
Deletes itself 1 IoCs
pid Process 1476 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run voryi.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\{CB118568-7F59-AD4D-CD9C-5E5DE9C17D40} = "C:\\Users\\Admin\\AppData\\Roaming\\Nuoc\\voryi.exe" voryi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2024 set thread context of 1476 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe 1688 voryi.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1688 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe 27 PID 2024 wrote to memory of 1688 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe 27 PID 2024 wrote to memory of 1688 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe 27 PID 2024 wrote to memory of 1688 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe 27 PID 1688 wrote to memory of 1232 1688 voryi.exe 17 PID 1688 wrote to memory of 1232 1688 voryi.exe 17 PID 1688 wrote to memory of 1232 1688 voryi.exe 17 PID 1688 wrote to memory of 1232 1688 voryi.exe 17 PID 1688 wrote to memory of 1232 1688 voryi.exe 17 PID 1688 wrote to memory of 1328 1688 voryi.exe 16 PID 1688 wrote to memory of 1328 1688 voryi.exe 16 PID 1688 wrote to memory of 1328 1688 voryi.exe 16 PID 1688 wrote to memory of 1328 1688 voryi.exe 16 PID 1688 wrote to memory of 1328 1688 voryi.exe 16 PID 1688 wrote to memory of 1368 1688 voryi.exe 15 PID 1688 wrote to memory of 1368 1688 voryi.exe 15 PID 1688 wrote to memory of 1368 1688 voryi.exe 15 PID 1688 wrote to memory of 1368 1688 voryi.exe 15 PID 1688 wrote to memory of 1368 1688 voryi.exe 15 PID 1688 wrote to memory of 2024 1688 voryi.exe 26 PID 1688 wrote to memory of 2024 1688 voryi.exe 26 PID 1688 wrote to memory of 2024 1688 voryi.exe 26 PID 1688 wrote to memory of 2024 1688 voryi.exe 26 PID 1688 wrote to memory of 2024 1688 voryi.exe 26 PID 2024 wrote to memory of 1476 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe 28 PID 2024 wrote to memory of 1476 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe 28 PID 2024 wrote to memory of 1476 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe 28 PID 2024 wrote to memory of 1476 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe 28 PID 2024 wrote to memory of 1476 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe 28 PID 2024 wrote to memory of 1476 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe 28 PID 2024 wrote to memory of 1476 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe 28 PID 2024 wrote to memory of 1476 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe 28 PID 2024 wrote to memory of 1476 2024 44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe"C:\Users\Admin\AppData\Local\Temp\44900d907785e6eab71a08753cfc21f11658fe01c4535f75d1dd366b64defa59.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\Nuoc\voryi.exe"C:\Users\Admin\AppData\Roaming\Nuoc\voryi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1688
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp51d3635e.bat"3⤵
- Deletes itself
PID:1476
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1328
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD577694095ea2fb6fd2de57d2704eb8ff4
SHA1656078ad0d47c45207b2cdac2ecfb8d3e066b6e2
SHA256edf4301142acb2506d4deae705df3f364ca53899f0c6a3e85ff64df16694a599
SHA5120f0025d2e457fa3f249981eeb6d275f8c62d8a0c48bc21a082a976ca413ba2a43b0d006e7328d10471002c810db37092bb213985d021a147450a04bc4f56f840
-
Filesize
305KB
MD52c496bd6791775a9afb0beb0fa06266c
SHA1931e01ae033ec3b40d06f7bd6af415c11dbdc4f4
SHA2569159a1510b35f52f21b9fc3f44aa12b8675fc33cf99c47a6e6f7c2bb86dac853
SHA512e4988369029c7ebcd0062a2186ed0ffd466d50350a807af6d7050bd5540a683c246bf48544a627dfb8e5b142bcaf9f2bcee4954ef098b5a133b089729b9b0dfd
-
Filesize
305KB
MD52c496bd6791775a9afb0beb0fa06266c
SHA1931e01ae033ec3b40d06f7bd6af415c11dbdc4f4
SHA2569159a1510b35f52f21b9fc3f44aa12b8675fc33cf99c47a6e6f7c2bb86dac853
SHA512e4988369029c7ebcd0062a2186ed0ffd466d50350a807af6d7050bd5540a683c246bf48544a627dfb8e5b142bcaf9f2bcee4954ef098b5a133b089729b9b0dfd
-
Filesize
305KB
MD52c496bd6791775a9afb0beb0fa06266c
SHA1931e01ae033ec3b40d06f7bd6af415c11dbdc4f4
SHA2569159a1510b35f52f21b9fc3f44aa12b8675fc33cf99c47a6e6f7c2bb86dac853
SHA512e4988369029c7ebcd0062a2186ed0ffd466d50350a807af6d7050bd5540a683c246bf48544a627dfb8e5b142bcaf9f2bcee4954ef098b5a133b089729b9b0dfd
-
Filesize
305KB
MD52c496bd6791775a9afb0beb0fa06266c
SHA1931e01ae033ec3b40d06f7bd6af415c11dbdc4f4
SHA2569159a1510b35f52f21b9fc3f44aa12b8675fc33cf99c47a6e6f7c2bb86dac853
SHA512e4988369029c7ebcd0062a2186ed0ffd466d50350a807af6d7050bd5540a683c246bf48544a627dfb8e5b142bcaf9f2bcee4954ef098b5a133b089729b9b0dfd