Analysis
-
max time kernel
169s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 15:45
Static task
static1
Behavioral task
behavioral1
Sample
a49f4356f0bd0114da3a2acc83dcb81d7973a252321f80b373445f5864d54c32.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a49f4356f0bd0114da3a2acc83dcb81d7973a252321f80b373445f5864d54c32.exe
Resource
win10v2004-20220812-en
General
-
Target
a49f4356f0bd0114da3a2acc83dcb81d7973a252321f80b373445f5864d54c32.exe
-
Size
333KB
-
MD5
908948fc6d622c80f3dcda8fa0c70ab0
-
SHA1
04ea92fd20e49f04e277113543f2595bafe06f11
-
SHA256
a49f4356f0bd0114da3a2acc83dcb81d7973a252321f80b373445f5864d54c32
-
SHA512
58c794be6b67f365d80058623d56510674dd27d0d036cf2a45dbaf16f5f42c0d765ec1d83d9049acc2bc08d96edcb195940fc513fb684076979e53b397c0fc2a
-
SSDEEP
6144:9xF74x5b59oicM83lIPUdJ4+n+IW+xdY2DDQdsiyfxPh4eUT/1XPGL1qm2v527Qn:qx519otM83Nx+IZTbD7iy5kThGLY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3468 dyish.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\Currentversion\Run dyish.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{3E453350-556D-BCA0-DD18-DB6F10EDC16D} = "C:\\Users\\Admin\\AppData\\Roaming\\Vyoc\\dyish.exe" dyish.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4980 set thread context of 3060 4980 a49f4356f0bd0114da3a2acc83dcb81d7973a252321f80b373445f5864d54c32.exe 82 -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe 3468 dyish.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4980 wrote to memory of 3468 4980 a49f4356f0bd0114da3a2acc83dcb81d7973a252321f80b373445f5864d54c32.exe 81 PID 4980 wrote to memory of 3468 4980 a49f4356f0bd0114da3a2acc83dcb81d7973a252321f80b373445f5864d54c32.exe 81 PID 4980 wrote to memory of 3468 4980 a49f4356f0bd0114da3a2acc83dcb81d7973a252321f80b373445f5864d54c32.exe 81 PID 3468 wrote to memory of 2356 3468 dyish.exe 49 PID 3468 wrote to memory of 2356 3468 dyish.exe 49 PID 3468 wrote to memory of 2356 3468 dyish.exe 49 PID 3468 wrote to memory of 2356 3468 dyish.exe 49 PID 3468 wrote to memory of 2356 3468 dyish.exe 49 PID 3468 wrote to memory of 2376 3468 dyish.exe 48 PID 3468 wrote to memory of 2376 3468 dyish.exe 48 PID 3468 wrote to memory of 2376 3468 dyish.exe 48 PID 3468 wrote to memory of 2376 3468 dyish.exe 48 PID 3468 wrote to memory of 2376 3468 dyish.exe 48 PID 3468 wrote to memory of 2524 3468 dyish.exe 45 PID 3468 wrote to memory of 2524 3468 dyish.exe 45 PID 3468 wrote to memory of 2524 3468 dyish.exe 45 PID 3468 wrote to memory of 2524 3468 dyish.exe 45 PID 3468 wrote to memory of 2524 3468 dyish.exe 45 PID 3468 wrote to memory of 2832 3468 dyish.exe 38 PID 3468 wrote to memory of 2832 3468 dyish.exe 38 PID 3468 wrote to memory of 2832 3468 dyish.exe 38 PID 3468 wrote to memory of 2832 3468 dyish.exe 38 PID 3468 wrote to memory of 2832 3468 dyish.exe 38 PID 3468 wrote to memory of 3080 3468 dyish.exe 37 PID 3468 wrote to memory of 3080 3468 dyish.exe 37 PID 3468 wrote to memory of 3080 3468 dyish.exe 37 PID 3468 wrote to memory of 3080 3468 dyish.exe 37 PID 3468 wrote to memory of 3080 3468 dyish.exe 37 PID 3468 wrote to memory of 3272 3468 dyish.exe 36 PID 3468 wrote to memory of 3272 3468 dyish.exe 36 PID 3468 wrote to memory of 3272 3468 dyish.exe 36 PID 3468 wrote to memory of 3272 3468 dyish.exe 36 PID 3468 wrote to memory of 3272 3468 dyish.exe 36 PID 3468 wrote to memory of 3368 3468 dyish.exe 35 PID 3468 wrote to memory of 3368 3468 dyish.exe 35 PID 3468 wrote to memory of 3368 3468 dyish.exe 35 PID 3468 wrote to memory of 3368 3468 dyish.exe 35 PID 3468 wrote to memory of 3368 3468 dyish.exe 35 PID 3468 wrote to memory of 3440 3468 dyish.exe 13 PID 3468 wrote to memory of 3440 3468 dyish.exe 13 PID 3468 wrote to memory of 3440 3468 dyish.exe 13 PID 3468 wrote to memory of 3440 3468 dyish.exe 13 PID 3468 wrote to memory of 3440 3468 dyish.exe 13 PID 3468 wrote to memory of 3532 3468 dyish.exe 34 PID 3468 wrote to memory of 3532 3468 dyish.exe 34 PID 3468 wrote to memory of 3532 3468 dyish.exe 34 PID 3468 wrote to memory of 3532 3468 dyish.exe 34 PID 3468 wrote to memory of 3532 3468 dyish.exe 34 PID 3468 wrote to memory of 3660 3468 dyish.exe 33 PID 3468 wrote to memory of 3660 3468 dyish.exe 33 PID 3468 wrote to memory of 3660 3468 dyish.exe 33 PID 3468 wrote to memory of 3660 3468 dyish.exe 33 PID 3468 wrote to memory of 3660 3468 dyish.exe 33 PID 3468 wrote to memory of 4624 3468 dyish.exe 30 PID 3468 wrote to memory of 4624 3468 dyish.exe 30 PID 3468 wrote to memory of 4624 3468 dyish.exe 30 PID 3468 wrote to memory of 4624 3468 dyish.exe 30 PID 3468 wrote to memory of 4624 3468 dyish.exe 30 PID 3468 wrote to memory of 3960 3468 dyish.exe 15 PID 3468 wrote to memory of 3960 3468 dyish.exe 15 PID 3468 wrote to memory of 3960 3468 dyish.exe 15 PID 3468 wrote to memory of 3960 3468 dyish.exe 15 PID 3468 wrote to memory of 3960 3468 dyish.exe 15 PID 3468 wrote to memory of 4752 3468 dyish.exe 14
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3440
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4752
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:3960
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4624
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3660
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3532
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3368
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3272
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3080
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\a49f4356f0bd0114da3a2acc83dcb81d7973a252321f80b373445f5864d54c32.exe"C:\Users\Admin\AppData\Local\Temp\a49f4356f0bd0114da3a2acc83dcb81d7973a252321f80b373445f5864d54c32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Roaming\Vyoc\dyish.exe"C:\Users\Admin\AppData\Roaming\Vyoc\dyish.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3468
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp4dc042e4.bat"3⤵PID:3060
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2376
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2356
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD589575aa50a57475c17f568f6ccf55c30
SHA125a64f6b0a8933d75d9176ed906bdcfa79883d26
SHA256e1a1fcf87bddbc162efdbeb2857b207ff87a3a2a8d453b90ec30d55c470f7e48
SHA51211481d2d4ba9a855336d3f4f95425f29ddf0fe10f339a02e474c547f6fa5afa468614652d48d5562eb5e7dc3d17eac89f4b792fb67e2e1348aed24f7948e94d7
-
Filesize
333KB
MD5dc94e308ddee0de39ccf3a8aab4c3daa
SHA17dec14b3c31aca837d6b83d580d4558eb282b65b
SHA2564127cec50480d67d9813acf9159fae0fac5525cf130eda8846b06c743315bd4d
SHA51295d20bf9c75c01132984d5d741882d3fce052560f852f53a19cfc041b32ad3c20744f7e5cb8d9e6046e89cbde99440dc111c0345551d2a03fe4f761b3caad1a9
-
Filesize
333KB
MD5dc94e308ddee0de39ccf3a8aab4c3daa
SHA17dec14b3c31aca837d6b83d580d4558eb282b65b
SHA2564127cec50480d67d9813acf9159fae0fac5525cf130eda8846b06c743315bd4d
SHA51295d20bf9c75c01132984d5d741882d3fce052560f852f53a19cfc041b32ad3c20744f7e5cb8d9e6046e89cbde99440dc111c0345551d2a03fe4f761b3caad1a9