Analysis
-
max time kernel
154s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-10-2022 23:22
Static task
static1
Behavioral task
behavioral1
Sample
96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe
Resource
win10v2004-20220812-en
General
-
Target
96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe
-
Size
174KB
-
MD5
0bddb9ca8ea468049dd9c8d140a316a0
-
SHA1
cc46cec202ee1c4690ed96f5d1e6833874cf4cc9
-
SHA256
96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a
-
SHA512
aeee6c3633981efb6508996a130daba5efd8420815d1acad1214c4e99ffa1406fd3b2f586d5822a3afa6ba0d7c68e16bf7d9de57c2deded6fe45815221086249
-
SSDEEP
3072:wGZzdFwK7/5AN0OpgcMKgQu9xjiVmLI+ixRMvcowtVW5:w8bB/jSuswI+sRRrtw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 900 Xwyvia.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Xwyvia.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe File created C:\Windows\Xwyvia.exe 96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe File opened for modification C:\Windows\Xwyvia.exe 96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Xwyvia.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main Xwyvia.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\International Xwyvia.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe 900 Xwyvia.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 900 Xwyvia.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1584 wrote to memory of 900 1584 96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe 26 PID 1584 wrote to memory of 900 1584 96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe 26 PID 1584 wrote to memory of 900 1584 96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe 26 PID 1584 wrote to memory of 900 1584 96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe 26 PID 1584 wrote to memory of 900 1584 96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe 26 PID 1584 wrote to memory of 900 1584 96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe 26 PID 1584 wrote to memory of 900 1584 96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe"C:\Users\Admin\AppData\Local\Temp\96366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\Xwyvia.exeC:\Windows\Xwyvia.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD5793e9fa8d778d264196a859327d44842
SHA144c99c62b4d111b03ecefd480df76ddeac5f8dda
SHA256ffc7fbac7d1b6dd85bd3597e68cc85fc2d093ffe80cf7d23ff1391cd9d624e6f
SHA512829530f3b3e486dcc13a97ffc658d12d10bd67def961788574a61f071ed6e0c1f609b7710e6e73df8f60cee0109262e85e13dff37a676300236fc35510a4bf22
-
Filesize
174KB
MD50bddb9ca8ea468049dd9c8d140a316a0
SHA1cc46cec202ee1c4690ed96f5d1e6833874cf4cc9
SHA25696366ef7e5d1e7e0ba66097404c9e4c0428362a9026c020a76f6ed4e74b9382a
SHA512aeee6c3633981efb6508996a130daba5efd8420815d1acad1214c4e99ffa1406fd3b2f586d5822a3afa6ba0d7c68e16bf7d9de57c2deded6fe45815221086249