Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 11:57
Static task
static1
Behavioral task
behavioral1
Sample
d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe
Resource
win10v2004-20220812-en
General
-
Target
d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe
-
Size
296KB
-
MD5
a324579e17fa0f01e09ab733e512a200
-
SHA1
6516fb226555cb627bb64eaf9f758cad419a6eae
-
SHA256
d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027
-
SHA512
742dcac786a46f245db447070a3bc93b76b5ff2606edb6e16ade5e01b1f4518b87e46d4bd67f54b5f51125e5f59d990fbd967e40bf39d22ace08594cb24df3ff
-
SSDEEP
6144:ln9X0bbgz6pFYjMcW2CH4dEc2OxMgDj0/80S3RjRx4OF7/eTvUvhI/ANPf:44z6rYb/X6NTcoy7TOvkhYAx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1152 doqyy.exe -
Deletes itself 1 IoCs
pid Process 560 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run doqyy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Doqyy = "C:\\Users\\Admin\\AppData\\Roaming\\Yhebyp\\doqyy.exe" doqyy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1484 set thread context of 560 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe 1152 doqyy.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1484 wrote to memory of 1152 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe 27 PID 1484 wrote to memory of 1152 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe 27 PID 1484 wrote to memory of 1152 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe 27 PID 1484 wrote to memory of 1152 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe 27 PID 1152 wrote to memory of 1280 1152 doqyy.exe 17 PID 1152 wrote to memory of 1280 1152 doqyy.exe 17 PID 1152 wrote to memory of 1280 1152 doqyy.exe 17 PID 1152 wrote to memory of 1280 1152 doqyy.exe 17 PID 1152 wrote to memory of 1280 1152 doqyy.exe 17 PID 1152 wrote to memory of 1396 1152 doqyy.exe 16 PID 1152 wrote to memory of 1396 1152 doqyy.exe 16 PID 1152 wrote to memory of 1396 1152 doqyy.exe 16 PID 1152 wrote to memory of 1396 1152 doqyy.exe 16 PID 1152 wrote to memory of 1396 1152 doqyy.exe 16 PID 1152 wrote to memory of 1424 1152 doqyy.exe 15 PID 1152 wrote to memory of 1424 1152 doqyy.exe 15 PID 1152 wrote to memory of 1424 1152 doqyy.exe 15 PID 1152 wrote to memory of 1424 1152 doqyy.exe 15 PID 1152 wrote to memory of 1424 1152 doqyy.exe 15 PID 1152 wrote to memory of 1484 1152 doqyy.exe 26 PID 1152 wrote to memory of 1484 1152 doqyy.exe 26 PID 1152 wrote to memory of 1484 1152 doqyy.exe 26 PID 1152 wrote to memory of 1484 1152 doqyy.exe 26 PID 1152 wrote to memory of 1484 1152 doqyy.exe 26 PID 1484 wrote to memory of 560 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe 28 PID 1484 wrote to memory of 560 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe 28 PID 1484 wrote to memory of 560 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe 28 PID 1484 wrote to memory of 560 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe 28 PID 1484 wrote to memory of 560 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe 28 PID 1484 wrote to memory of 560 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe 28 PID 1484 wrote to memory of 560 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe 28 PID 1484 wrote to memory of 560 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe 28 PID 1484 wrote to memory of 560 1484 d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe"C:\Users\Admin\AppData\Local\Temp\d6e69e7999b16cd7d8f9a35c19e9b49661f7ec54340ab4b601857acb9596c027.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Roaming\Yhebyp\doqyy.exe"C:\Users\Admin\AppData\Roaming\Yhebyp\doqyy.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1152
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\GMD67E.bat"3⤵
- Deletes itself
PID:560
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1396
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD5b921990965f2ea7698a0214c22f9a5f2
SHA13eb6c6eec87d81bb30cbf0be5794d509068f6a48
SHA256c911552bffba68e470c19654ad96cce3cbac578691a87f009f19df28320f683c
SHA5126092b77f424f936f0e2daf0319590c1044543457dd81fcd2eb42a5fd60c9092557c5e7e00fa4ee110ad1b6b5237a938730fa3036a8c9b2a94a1002911bf9b5f7
-
Filesize
296KB
MD50971df9a760e47ed54fa6561f84eea7e
SHA1e1d9cd2ff73d277b9bacc2a79796e2b1b5e4226e
SHA256315714f56969ad77c54d5ea42727169dcbb1e32f4ebd326c2bd357627c359510
SHA5127e6b975115fa056fa3781db44df8fdd9828afe3aad2c43fcecfe1eb00043f19e6f1d9c953a4c228ed15d44dbccae29960b7e65ebc899e32b7934bc49f3cd4ac7
-
Filesize
296KB
MD50971df9a760e47ed54fa6561f84eea7e
SHA1e1d9cd2ff73d277b9bacc2a79796e2b1b5e4226e
SHA256315714f56969ad77c54d5ea42727169dcbb1e32f4ebd326c2bd357627c359510
SHA5127e6b975115fa056fa3781db44df8fdd9828afe3aad2c43fcecfe1eb00043f19e6f1d9c953a4c228ed15d44dbccae29960b7e65ebc899e32b7934bc49f3cd4ac7
-
Filesize
296KB
MD50971df9a760e47ed54fa6561f84eea7e
SHA1e1d9cd2ff73d277b9bacc2a79796e2b1b5e4226e
SHA256315714f56969ad77c54d5ea42727169dcbb1e32f4ebd326c2bd357627c359510
SHA5127e6b975115fa056fa3781db44df8fdd9828afe3aad2c43fcecfe1eb00043f19e6f1d9c953a4c228ed15d44dbccae29960b7e65ebc899e32b7934bc49f3cd4ac7
-
Filesize
296KB
MD50971df9a760e47ed54fa6561f84eea7e
SHA1e1d9cd2ff73d277b9bacc2a79796e2b1b5e4226e
SHA256315714f56969ad77c54d5ea42727169dcbb1e32f4ebd326c2bd357627c359510
SHA5127e6b975115fa056fa3781db44df8fdd9828afe3aad2c43fcecfe1eb00043f19e6f1d9c953a4c228ed15d44dbccae29960b7e65ebc899e32b7934bc49f3cd4ac7