Analysis
-
max time kernel
168s -
max time network
230s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe
Resource
win10v2004-20220812-en
General
-
Target
74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe
-
Size
290KB
-
MD5
a0bd8e0ef5563a0d0f60be4bd6d7f96e
-
SHA1
85b5404e81d0b61ffd437a1f5d85d2d06b78bb60
-
SHA256
74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8
-
SHA512
ad645082e4e52bbd719d3f715d6a0b8cc34ae3c8715ce7d3f1aec97eafa99f84adbe09a90af95cb51808529175aa1502bda94af1756c73b1ce5ffb5607bdcc6f
-
SSDEEP
6144:hfsoV09Du+Rc9DMQtc9LMojzmx1i68Nbp67pkkDvarudYLx3IhpD:hR2C9DGh1wi6ApephDvvY13QpD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1388 osakx.exe -
Deletes itself 1 IoCs
pid Process 700 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run osakx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7BD94DA8-4FEF-AD4D-5225-887A4931AB67} = "C:\\Users\\Admin\\AppData\\Roaming\\Abfufy\\osakx.exe" osakx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 908 set thread context of 700 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe 1388 osakx.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe Token: SeSecurityPrivilege 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe Token: SeSecurityPrivilege 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 1388 osakx.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 908 wrote to memory of 1388 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 28 PID 908 wrote to memory of 1388 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 28 PID 908 wrote to memory of 1388 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 28 PID 908 wrote to memory of 1388 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 28 PID 1388 wrote to memory of 1116 1388 osakx.exe 17 PID 1388 wrote to memory of 1116 1388 osakx.exe 17 PID 1388 wrote to memory of 1116 1388 osakx.exe 17 PID 1388 wrote to memory of 1116 1388 osakx.exe 17 PID 1388 wrote to memory of 1116 1388 osakx.exe 17 PID 1388 wrote to memory of 1188 1388 osakx.exe 16 PID 1388 wrote to memory of 1188 1388 osakx.exe 16 PID 1388 wrote to memory of 1188 1388 osakx.exe 16 PID 1388 wrote to memory of 1188 1388 osakx.exe 16 PID 1388 wrote to memory of 1188 1388 osakx.exe 16 PID 1388 wrote to memory of 1216 1388 osakx.exe 9 PID 1388 wrote to memory of 1216 1388 osakx.exe 9 PID 1388 wrote to memory of 1216 1388 osakx.exe 9 PID 1388 wrote to memory of 1216 1388 osakx.exe 9 PID 1388 wrote to memory of 1216 1388 osakx.exe 9 PID 1388 wrote to memory of 908 1388 osakx.exe 19 PID 1388 wrote to memory of 908 1388 osakx.exe 19 PID 1388 wrote to memory of 908 1388 osakx.exe 19 PID 1388 wrote to memory of 908 1388 osakx.exe 19 PID 1388 wrote to memory of 908 1388 osakx.exe 19 PID 908 wrote to memory of 700 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 29 PID 908 wrote to memory of 700 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 29 PID 908 wrote to memory of 700 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 29 PID 908 wrote to memory of 700 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 29 PID 908 wrote to memory of 700 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 29 PID 908 wrote to memory of 700 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 29 PID 908 wrote to memory of 700 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 29 PID 908 wrote to memory of 700 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 29 PID 908 wrote to memory of 700 908 74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe"C:\Users\Admin\AppData\Local\Temp\74bf7b60dce3eebeec21eacaccce1fe3197d3836f9fe01485cb57db7fddcf5c8.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Roaming\Abfufy\osakx.exe"C:\Users\Admin\AppData\Roaming\Abfufy\osakx.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1388
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpaeb9b3dd.bat"3⤵
- Deletes itself
PID:700
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD53c94ad0f0aba262b164d96ba5ec36118
SHA1b7e2d3cf1f0800f25cc3488d8cfb3ccc704bb48a
SHA25653e3f634a2cf2465728fbf90eb48421ef56e9f21df3f192f3734abfd23ddc610
SHA512d1480026bd0d21a9180fcf665c6ffcc008b43115a0f5e4c9653e0b1b8afeb772e11ca83500a0dca31cb4f4cdd87f65bc3ca3a97811340401fccc1e9b8eed714f
-
Filesize
290KB
MD5f9dc920a0bb4a826f3809f5438571176
SHA1adc3b6d005f4342c5abceea2661c64c525da71db
SHA256ac3a7b0ca67cf2e6ecdb8824b33b82147a787fee37d324da992e19227917ce34
SHA5124239212673b8851c2490dd55069f743290c8e0d17692f23c802d2adfd2a1d7af8cbd893822d666a19853547273c3c45efb6371065a42cb7a088acb409182c2d9
-
Filesize
290KB
MD5f9dc920a0bb4a826f3809f5438571176
SHA1adc3b6d005f4342c5abceea2661c64c525da71db
SHA256ac3a7b0ca67cf2e6ecdb8824b33b82147a787fee37d324da992e19227917ce34
SHA5124239212673b8851c2490dd55069f743290c8e0d17692f23c802d2adfd2a1d7af8cbd893822d666a19853547273c3c45efb6371065a42cb7a088acb409182c2d9
-
Filesize
398B
MD576a2b94f35ee2c1df28491e040139729
SHA1896e760d75ed25efef193ec9a933b1ff7e0f717c
SHA256aa8c681f92d9306f92567cfb1b832a29a9e2a8284501b7d65add3379dc903d6f
SHA51211b3e3ac0c737d1384088f9befbd00f9b8704686983068d12dcc123cc47dd517fa2c676d56c07744974506e84b5bc66a94215ca40fbdc5bfee2537882c4b976b
-
Filesize
290KB
MD5f9dc920a0bb4a826f3809f5438571176
SHA1adc3b6d005f4342c5abceea2661c64c525da71db
SHA256ac3a7b0ca67cf2e6ecdb8824b33b82147a787fee37d324da992e19227917ce34
SHA5124239212673b8851c2490dd55069f743290c8e0d17692f23c802d2adfd2a1d7af8cbd893822d666a19853547273c3c45efb6371065a42cb7a088acb409182c2d9
-
Filesize
290KB
MD5f9dc920a0bb4a826f3809f5438571176
SHA1adc3b6d005f4342c5abceea2661c64c525da71db
SHA256ac3a7b0ca67cf2e6ecdb8824b33b82147a787fee37d324da992e19227917ce34
SHA5124239212673b8851c2490dd55069f743290c8e0d17692f23c802d2adfd2a1d7af8cbd893822d666a19853547273c3c45efb6371065a42cb7a088acb409182c2d9