Analysis
-
max time kernel
151s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 07:20
Behavioral task
behavioral1
Sample
7f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7.exe
Resource
win10v2004-20220812-en
General
-
Target
7f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7.exe
-
Size
1011KB
-
MD5
59c9b7c6507bc718780b46e6a01839c0
-
SHA1
58f6056de40c28956e7dc36913915b1b6f597e21
-
SHA256
7f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7
-
SHA512
6d5fd94bf5fde5da49980dcf703a6da45fbab64e12bcff81f5f12997645626857e2327d1f2c0a39eb490818603e818401d14fc2222a0e462d9a43642b1a7bc2a
-
SSDEEP
24576:WGeByAZpyq8OawmaLn52tgxDvjQ9tFwScqaKP:heBdZpyyLnnxDvjQFpLrP
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jcldkb3z7ylfrinhjmjqqob.exe cryptone C:\Users\Admin\AppData\Local\Temp\jcldkb3z7ylfrinhjmjqqob.exe cryptone C:\Users\Admin\AppData\Local\frzrmhyqz.exe cryptone C:\Users\Admin\AppData\Local\frzrmhyqz.exe cryptone C:\Users\Admin\AppData\Local\hkmkelryw.exe cryptone C:\Users\Admin\AppData\Local\hkmkelryw.exe cryptone -
Executes dropped EXE 3 IoCs
Processes:
jcldkb3z7ylfrinhjmjqqob.exefrzrmhyqz.exehkmkelryw.exepid process 2200 jcldkb3z7ylfrinhjmjqqob.exe 5864 frzrmhyqz.exe 2680 hkmkelryw.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
jcldkb3z7ylfrinhjmjqqob.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Telephony IP CardSpace DNS Security = "C:\\Users\\Admin\\AppData\\Local\\frzrmhyqz.exe" jcldkb3z7ylfrinhjmjqqob.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
frzrmhyqz.exehkmkelryw.exepid process 5864 frzrmhyqz.exe 5864 frzrmhyqz.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 5864 frzrmhyqz.exe 5864 frzrmhyqz.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 5864 frzrmhyqz.exe 5864 frzrmhyqz.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 5864 frzrmhyqz.exe 5864 frzrmhyqz.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 5864 frzrmhyqz.exe 5864 frzrmhyqz.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 5864 frzrmhyqz.exe 5864 frzrmhyqz.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 5864 frzrmhyqz.exe 5864 frzrmhyqz.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 5864 frzrmhyqz.exe 5864 frzrmhyqz.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 5864 frzrmhyqz.exe 5864 frzrmhyqz.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 5864 frzrmhyqz.exe 5864 frzrmhyqz.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe 5864 frzrmhyqz.exe 5864 frzrmhyqz.exe 2680 hkmkelryw.exe 2680 hkmkelryw.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
7f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7.exejcldkb3z7ylfrinhjmjqqob.exefrzrmhyqz.exedescription pid process target process PID 2856 wrote to memory of 2200 2856 7f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7.exe jcldkb3z7ylfrinhjmjqqob.exe PID 2856 wrote to memory of 2200 2856 7f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7.exe jcldkb3z7ylfrinhjmjqqob.exe PID 2856 wrote to memory of 2200 2856 7f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7.exe jcldkb3z7ylfrinhjmjqqob.exe PID 2200 wrote to memory of 5864 2200 jcldkb3z7ylfrinhjmjqqob.exe frzrmhyqz.exe PID 2200 wrote to memory of 5864 2200 jcldkb3z7ylfrinhjmjqqob.exe frzrmhyqz.exe PID 2200 wrote to memory of 5864 2200 jcldkb3z7ylfrinhjmjqqob.exe frzrmhyqz.exe PID 5864 wrote to memory of 2680 5864 frzrmhyqz.exe hkmkelryw.exe PID 5864 wrote to memory of 2680 5864 frzrmhyqz.exe hkmkelryw.exe PID 5864 wrote to memory of 2680 5864 frzrmhyqz.exe hkmkelryw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7.exe"C:\Users\Admin\AppData\Local\Temp\7f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jcldkb3z7ylfrinhjmjqqob.exe"C:\Users\Admin\AppData\Local\Temp\jcldkb3z7ylfrinhjmjqqob.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\frzrmhyqz.exe"C:\Users\Admin\AppData\Local\frzrmhyqz.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\hkmkelryw.exeWATCHDOGPROC "c:\users\admin\appdata\local\frzrmhyqz.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\jcldkb3z7ylfrinhjmjqqob.exeFilesize
1011KB
MD559c9b7c6507bc718780b46e6a01839c0
SHA158f6056de40c28956e7dc36913915b1b6f597e21
SHA2567f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7
SHA5126d5fd94bf5fde5da49980dcf703a6da45fbab64e12bcff81f5f12997645626857e2327d1f2c0a39eb490818603e818401d14fc2222a0e462d9a43642b1a7bc2a
-
C:\Users\Admin\AppData\Local\Temp\jcldkb3z7ylfrinhjmjqqob.exeFilesize
1011KB
MD559c9b7c6507bc718780b46e6a01839c0
SHA158f6056de40c28956e7dc36913915b1b6f597e21
SHA2567f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7
SHA5126d5fd94bf5fde5da49980dcf703a6da45fbab64e12bcff81f5f12997645626857e2327d1f2c0a39eb490818603e818401d14fc2222a0e462d9a43642b1a7bc2a
-
C:\Users\Admin\AppData\Local\frzrmhyqz.exeFilesize
1011KB
MD559c9b7c6507bc718780b46e6a01839c0
SHA158f6056de40c28956e7dc36913915b1b6f597e21
SHA2567f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7
SHA5126d5fd94bf5fde5da49980dcf703a6da45fbab64e12bcff81f5f12997645626857e2327d1f2c0a39eb490818603e818401d14fc2222a0e462d9a43642b1a7bc2a
-
C:\Users\Admin\AppData\Local\frzrmhyqz.exeFilesize
1011KB
MD559c9b7c6507bc718780b46e6a01839c0
SHA158f6056de40c28956e7dc36913915b1b6f597e21
SHA2567f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7
SHA5126d5fd94bf5fde5da49980dcf703a6da45fbab64e12bcff81f5f12997645626857e2327d1f2c0a39eb490818603e818401d14fc2222a0e462d9a43642b1a7bc2a
-
C:\Users\Admin\AppData\Local\hkmkelryw.exeFilesize
1011KB
MD559c9b7c6507bc718780b46e6a01839c0
SHA158f6056de40c28956e7dc36913915b1b6f597e21
SHA2567f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7
SHA5126d5fd94bf5fde5da49980dcf703a6da45fbab64e12bcff81f5f12997645626857e2327d1f2c0a39eb490818603e818401d14fc2222a0e462d9a43642b1a7bc2a
-
C:\Users\Admin\AppData\Local\hkmkelryw.exeFilesize
1011KB
MD559c9b7c6507bc718780b46e6a01839c0
SHA158f6056de40c28956e7dc36913915b1b6f597e21
SHA2567f449a5148ec86d84418b1fd0948d5a74b7d5d04fb73bc158432b0d1c5f59ce7
SHA5126d5fd94bf5fde5da49980dcf703a6da45fbab64e12bcff81f5f12997645626857e2327d1f2c0a39eb490818603e818401d14fc2222a0e462d9a43642b1a7bc2a
-
C:\Users\Admin\AppData\Local\lzfhdoipfuane\etcFilesize
10B
MD534d315fe1eeb3cb7b697559c67117622
SHA1dfbe195cd969ef930ea4a6550373108841e2ef45
SHA256fe49605d50c801f8620cd759c34bd56500ccfb2642868290a53a1a34f2485530
SHA512f1fe211b0cb77204f3898ea921c65d55957e595690e8a3b23c9c7c815d9f76cc8b513809fb7f8c33b18fbcc1af3a093158b9423efa07c188be61f31cf4511d51
-
C:\Users\Admin\AppData\Local\lzfhdoipfuane\rngFilesize
4B
MD53bf81e2bf6dc61706efb9a6dadc5793a
SHA1bf1bbfb3b5aaddbc5065b8440ea616d84fad8ff2
SHA256961ae28829f0b1cfbd073eff070ac5ea8994618c0e84fab4764367464a14b854
SHA512354f74cb52f314226a6021c5745799d05a0c8ba21246c9717b8ce211193603c4704b72332f80576d15b14d76c8f772cd5b6fa7a10acb60fab67411573f732b1c
-
C:\Users\Admin\AppData\Local\lzfhdoipfuane\tstFilesize
10B
MD5bdd59441ea086de6aa5fdd626116a95d
SHA1567f98e4d269a7ebf3bc7f255857e1f6dd435273
SHA256652501c96221f778bdef647c8c5f0353dd658079e84e93817bec0afe422fdce2
SHA512b757f699214abdcbbc1f50b4ba7cb2faf30ef6d9916920cf6ef396a76f24a986341cd5743e17d530b3e1d80d8103dc8d3c48ad1ba670c0f7fd8e512cb0710a46
-
C:\Users\Admin\AppData\Local\lzfhdoipfuane\tstFilesize
10B
MD5bdd59441ea086de6aa5fdd626116a95d
SHA1567f98e4d269a7ebf3bc7f255857e1f6dd435273
SHA256652501c96221f778bdef647c8c5f0353dd658079e84e93817bec0afe422fdce2
SHA512b757f699214abdcbbc1f50b4ba7cb2faf30ef6d9916920cf6ef396a76f24a986341cd5743e17d530b3e1d80d8103dc8d3c48ad1ba670c0f7fd8e512cb0710a46
-
C:\Users\Admin\AppData\Local\lzfhdoipfuane\tstFilesize
10B
MD5bdd59441ea086de6aa5fdd626116a95d
SHA1567f98e4d269a7ebf3bc7f255857e1f6dd435273
SHA256652501c96221f778bdef647c8c5f0353dd658079e84e93817bec0afe422fdce2
SHA512b757f699214abdcbbc1f50b4ba7cb2faf30ef6d9916920cf6ef396a76f24a986341cd5743e17d530b3e1d80d8103dc8d3c48ad1ba670c0f7fd8e512cb0710a46
-
memory/2200-132-0x0000000000000000-mapping.dmp
-
memory/2680-141-0x0000000000000000-mapping.dmp
-
memory/5864-136-0x0000000000000000-mapping.dmp