Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 21:23
Static task
static1
Behavioral task
behavioral1
Sample
eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe
Resource
win10v2004-20220812-en
General
-
Target
eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe
-
Size
243KB
-
MD5
91809ba8f3e9fd41628cb1b0820ef840
-
SHA1
0acf715b44e4cdc934b8cf4e49bf0651e22b50a7
-
SHA256
eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8
-
SHA512
2873d58420b9c5a19a24b10c7b39c4591bd75dab32ab7c11f3dc9ecfbcafeea93e979a215a098a0e0b769d8c143dc2ed4950206274915829394311b7c82ec526
-
SSDEEP
6144:dFB2fiDv6glRq2QtRwuQ7S4+QCDmDraBNHGU54dqhs/dHW:dFBDv6glJQ8S4+QCKDrINmUehd2
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1716 winsec.exe 1440 oronf.exe 564 oronf.exe -
Deletes itself 1 IoCs
pid Process 1272 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1044 eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\1524141042 = "C:\\Users\\Admin\\AppData\\Roaming\\Kuymopdy\\oronf.exe" oronf.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run oronf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\1524141042 = "C:\\Users\\Admin\\AppData\\Roaming\\Kuymopdy\\oronf.exe" oronf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run oronf.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winsec.exe eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe File created C:\Windows\SysWOW64\winsec.exe eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Security Center Update - 4233470357.job eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main oronf.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 564 oronf.exe 564 oronf.exe 564 oronf.exe 564 oronf.exe 564 oronf.exe 564 oronf.exe 564 oronf.exe 564 oronf.exe 564 oronf.exe 564 oronf.exe 564 oronf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 564 oronf.exe 564 oronf.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1440 1044 eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe 28 PID 1044 wrote to memory of 1440 1044 eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe 28 PID 1044 wrote to memory of 1440 1044 eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe 28 PID 1044 wrote to memory of 1440 1044 eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe 28 PID 1440 wrote to memory of 564 1440 oronf.exe 29 PID 1440 wrote to memory of 564 1440 oronf.exe 29 PID 1440 wrote to memory of 564 1440 oronf.exe 29 PID 1440 wrote to memory of 564 1440 oronf.exe 29 PID 1440 wrote to memory of 564 1440 oronf.exe 29 PID 1440 wrote to memory of 564 1440 oronf.exe 29 PID 1440 wrote to memory of 564 1440 oronf.exe 29 PID 1440 wrote to memory of 564 1440 oronf.exe 29 PID 1440 wrote to memory of 564 1440 oronf.exe 29 PID 1440 wrote to memory of 564 1440 oronf.exe 29 PID 1044 wrote to memory of 1272 1044 eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe 30 PID 1044 wrote to memory of 1272 1044 eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe 30 PID 1044 wrote to memory of 1272 1044 eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe 30 PID 1044 wrote to memory of 1272 1044 eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe 30 PID 564 wrote to memory of 1640 564 oronf.exe 32 PID 564 wrote to memory of 1640 564 oronf.exe 32 PID 564 wrote to memory of 1640 564 oronf.exe 32 PID 564 wrote to memory of 1640 564 oronf.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe"C:\Users\Admin\AppData\Local\Temp\eaa8c0d6281c2a3317402338405628dd438e6abcda0f79c1602e18b7690f18f8.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\Kuymopdy\oronf.exe"C:\Users\Admin\AppData\Roaming\Kuymopdy\oronf.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Roaming\Kuymopdy\oronf.exe"C:\Users\Admin\AppData\Roaming\Kuymopdy\oronf.exe" -child3⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe4⤵PID:1640
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp3189f685.bat"2⤵
- Deletes itself
PID:1272
-
-
C:\Windows\SysWOW64\winsec.exe"C:\Windows\SysWOW64\winsec.exe" -service "C:\Users\Admin\AppData\Roaming\Kuymopdy\oronf.exe"1⤵
- Executes dropped EXE
PID:1716
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD56d8da7af11f64feb1e401ba3f471d14a
SHA1c131a494c1d60c8e26f43392e8892078f05a665a
SHA25628e74117d6a116a27a26ab6c7e27f0afc5e47d902932c3736be3e136c0153f5a
SHA512be0a788eacdf67d3d1431191db34c1814a9b89588881c58315d1d8e5fb5441f872b6e6a1dd78edd36544999ea3efea4d650bccb1121091f1721f79a00b64eb57
-
Filesize
243KB
MD5d84f0693384afb39bac2228872051540
SHA16da5e0ffd702a04c5eb6de8c225e71c0c479f46e
SHA2561c2620be97319716fdcb83c3e9aa65ec50e24c76fb031178d6c23377ca30aa6c
SHA5126cc5ce36669e0864564e79306f9e273e43c0679aedfa9f96c2d874aae03d26bb0d06cf746065f66a8759ffae2491e6d6977e368d1441d05d809c08bd9cfc4891
-
Filesize
243KB
MD5d84f0693384afb39bac2228872051540
SHA16da5e0ffd702a04c5eb6de8c225e71c0c479f46e
SHA2561c2620be97319716fdcb83c3e9aa65ec50e24c76fb031178d6c23377ca30aa6c
SHA5126cc5ce36669e0864564e79306f9e273e43c0679aedfa9f96c2d874aae03d26bb0d06cf746065f66a8759ffae2491e6d6977e368d1441d05d809c08bd9cfc4891
-
Filesize
243KB
MD5d84f0693384afb39bac2228872051540
SHA16da5e0ffd702a04c5eb6de8c225e71c0c479f46e
SHA2561c2620be97319716fdcb83c3e9aa65ec50e24c76fb031178d6c23377ca30aa6c
SHA5126cc5ce36669e0864564e79306f9e273e43c0679aedfa9f96c2d874aae03d26bb0d06cf746065f66a8759ffae2491e6d6977e368d1441d05d809c08bd9cfc4891
-
Filesize
108B
MD582f00e267a0f6e362ca9143f996cf6e1
SHA1d1a2f7c7d0af21119111d3698ce9d3554e00ede2
SHA25633f6840ac9dfdd6e3400e016ddd5e99e74d3ea96cbe17429ab906cf68585e9f5
SHA512a4490da26a0b1dbda15ccd4ad157bf1d70cc6851736fb9d9049a344add28eefec0bba191998cdfef856beeca36c7e4308f7b2adc2bd630d25fe4b4bfac2d382a
-
Filesize
243KB
MD5d84f0693384afb39bac2228872051540
SHA16da5e0ffd702a04c5eb6de8c225e71c0c479f46e
SHA2561c2620be97319716fdcb83c3e9aa65ec50e24c76fb031178d6c23377ca30aa6c
SHA5126cc5ce36669e0864564e79306f9e273e43c0679aedfa9f96c2d874aae03d26bb0d06cf746065f66a8759ffae2491e6d6977e368d1441d05d809c08bd9cfc4891
-
Filesize
243KB
MD5d84f0693384afb39bac2228872051540
SHA16da5e0ffd702a04c5eb6de8c225e71c0c479f46e
SHA2561c2620be97319716fdcb83c3e9aa65ec50e24c76fb031178d6c23377ca30aa6c
SHA5126cc5ce36669e0864564e79306f9e273e43c0679aedfa9f96c2d874aae03d26bb0d06cf746065f66a8759ffae2491e6d6977e368d1441d05d809c08bd9cfc4891
-
Filesize
243KB
MD5d84f0693384afb39bac2228872051540
SHA16da5e0ffd702a04c5eb6de8c225e71c0c479f46e
SHA2561c2620be97319716fdcb83c3e9aa65ec50e24c76fb031178d6c23377ca30aa6c
SHA5126cc5ce36669e0864564e79306f9e273e43c0679aedfa9f96c2d874aae03d26bb0d06cf746065f66a8759ffae2491e6d6977e368d1441d05d809c08bd9cfc4891