Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 01:08
Static task
static1
Behavioral task
behavioral1
Sample
ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe
Resource
win10v2004-20220812-en
General
-
Target
ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe
-
Size
185KB
-
MD5
0f42113e3b660af93e5fef09615cb727
-
SHA1
be1f82b12dbc572f29516cef5859bc75024b52d5
-
SHA256
ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8
-
SHA512
af12253e930ef35594a5c600ae1da977251c57b9c45e503ec6cf2c220a65e550e9a3b3e0c2f367b23b3a1f29471f01bf7418c97033758dd544cb5281f30f7578
-
SSDEEP
3072:mvRA50GP0vJ1uD8j6LqNPWWTBp1YsS+NSfXPc8/5/u0G:90RELqZWW9vhxsPfNu0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 276 axpo.exe -
Deletes itself 1 IoCs
pid Process 580 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run axpo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taqiquy = "C:\\Users\\Admin\\AppData\\Roaming\\Kyiku\\axpo.exe" axpo.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 992 set thread context of 580 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\2F3B74EC-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe 276 axpo.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeSecurityPrivilege 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe Token: SeSecurityPrivilege 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe Token: SeSecurityPrivilege 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe Token: SeSecurityPrivilege 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe Token: SeSecurityPrivilege 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe Token: SeSecurityPrivilege 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe Token: SeSecurityPrivilege 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe Token: SeSecurityPrivilege 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe Token: SeSecurityPrivilege 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe Token: SeSecurityPrivilege 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe Token: SeManageVolumePrivilege 1216 WinMail.exe Token: SeSecurityPrivilege 580 cmd.exe Token: SeSecurityPrivilege 580 cmd.exe Token: SeSecurityPrivilege 580 cmd.exe Token: SeSecurityPrivilege 580 cmd.exe Token: SeSecurityPrivilege 580 cmd.exe Token: SeSecurityPrivilege 580 cmd.exe Token: SeSecurityPrivilege 580 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1216 WinMail.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 992 wrote to memory of 276 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe 27 PID 992 wrote to memory of 276 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe 27 PID 992 wrote to memory of 276 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe 27 PID 992 wrote to memory of 276 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe 27 PID 276 wrote to memory of 1240 276 axpo.exe 15 PID 276 wrote to memory of 1240 276 axpo.exe 15 PID 276 wrote to memory of 1240 276 axpo.exe 15 PID 276 wrote to memory of 1240 276 axpo.exe 15 PID 276 wrote to memory of 1240 276 axpo.exe 15 PID 276 wrote to memory of 1332 276 axpo.exe 14 PID 276 wrote to memory of 1332 276 axpo.exe 14 PID 276 wrote to memory of 1332 276 axpo.exe 14 PID 276 wrote to memory of 1332 276 axpo.exe 14 PID 276 wrote to memory of 1332 276 axpo.exe 14 PID 276 wrote to memory of 1396 276 axpo.exe 13 PID 276 wrote to memory of 1396 276 axpo.exe 13 PID 276 wrote to memory of 1396 276 axpo.exe 13 PID 276 wrote to memory of 1396 276 axpo.exe 13 PID 276 wrote to memory of 1396 276 axpo.exe 13 PID 276 wrote to memory of 992 276 axpo.exe 26 PID 276 wrote to memory of 992 276 axpo.exe 26 PID 276 wrote to memory of 992 276 axpo.exe 26 PID 276 wrote to memory of 992 276 axpo.exe 26 PID 276 wrote to memory of 992 276 axpo.exe 26 PID 276 wrote to memory of 1216 276 axpo.exe 28 PID 276 wrote to memory of 1216 276 axpo.exe 28 PID 276 wrote to memory of 1216 276 axpo.exe 28 PID 276 wrote to memory of 1216 276 axpo.exe 28 PID 276 wrote to memory of 1216 276 axpo.exe 28 PID 992 wrote to memory of 580 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe 29 PID 992 wrote to memory of 580 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe 29 PID 992 wrote to memory of 580 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe 29 PID 992 wrote to memory of 580 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe 29 PID 992 wrote to memory of 580 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe 29 PID 992 wrote to memory of 580 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe 29 PID 992 wrote to memory of 580 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe 29 PID 992 wrote to memory of 580 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe 29 PID 992 wrote to memory of 580 992 ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe 29 PID 276 wrote to memory of 1940 276 axpo.exe 31 PID 276 wrote to memory of 1940 276 axpo.exe 31 PID 276 wrote to memory of 1940 276 axpo.exe 31 PID 276 wrote to memory of 1940 276 axpo.exe 31 PID 276 wrote to memory of 1940 276 axpo.exe 31 PID 276 wrote to memory of 1700 276 axpo.exe 32 PID 276 wrote to memory of 1700 276 axpo.exe 32 PID 276 wrote to memory of 1700 276 axpo.exe 32 PID 276 wrote to memory of 1700 276 axpo.exe 32 PID 276 wrote to memory of 1700 276 axpo.exe 32 PID 276 wrote to memory of 1664 276 axpo.exe 33 PID 276 wrote to memory of 1664 276 axpo.exe 33 PID 276 wrote to memory of 1664 276 axpo.exe 33 PID 276 wrote to memory of 1664 276 axpo.exe 33 PID 276 wrote to memory of 1664 276 axpo.exe 33 PID 276 wrote to memory of 1196 276 axpo.exe 34 PID 276 wrote to memory of 1196 276 axpo.exe 34 PID 276 wrote to memory of 1196 276 axpo.exe 34 PID 276 wrote to memory of 1196 276 axpo.exe 34 PID 276 wrote to memory of 1196 276 axpo.exe 34 PID 276 wrote to memory of 1584 276 axpo.exe 35 PID 276 wrote to memory of 1584 276 axpo.exe 35 PID 276 wrote to memory of 1584 276 axpo.exe 35 PID 276 wrote to memory of 1584 276 axpo.exe 35 PID 276 wrote to memory of 1584 276 axpo.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe"C:\Users\Admin\AppData\Local\Temp\ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Roaming\Kyiku\axpo.exe"C:\Users\Admin\AppData\Roaming\Kyiku\axpo.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:276
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpb226c96e.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1332
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1240
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1216
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1940
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1700
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1664
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1196
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1584
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5617f0e4da19f4ff19823feea634c6906
SHA142d5ff24495f0bc00b9c8f0936ae167acad20a24
SHA25680cb829abfa86191cd250d557da5d59ae519779741d5cf0376fd76ead474786a
SHA51293a41c10845ffcc5c13f9baf8248a324d071adef6d267175afcc9305804f9bef175534c94ba6ff1d06ce19f665639d83f551739e8a6a8899beed43621b40447e
-
Filesize
185KB
MD5a667dba983a7e284c49747041fd064bd
SHA1ad818971b77218a2443700f1d06722044aa1dcad
SHA2566f419641c4acde226e0d58c3129b938963526192f0dddefbec143c7bce66414d
SHA512142ff08c74845e52db3334592c10f14b0724d44bed13a0ebb6ac277379d81f3709826e43e3862bf870aff5009a5ae12f36992c4c4a02b534a59b673bc08afe6d
-
Filesize
185KB
MD5a667dba983a7e284c49747041fd064bd
SHA1ad818971b77218a2443700f1d06722044aa1dcad
SHA2566f419641c4acde226e0d58c3129b938963526192f0dddefbec143c7bce66414d
SHA512142ff08c74845e52db3334592c10f14b0724d44bed13a0ebb6ac277379d81f3709826e43e3862bf870aff5009a5ae12f36992c4c4a02b534a59b673bc08afe6d
-
Filesize
4KB
MD558b9be8992865fa19df77aba1ee06e08
SHA14e9e5d2392ed29166f5f5b11f3d4a8bbe34ae933
SHA256d65b673196df55fc567b9d5921d26a0e0c799a4cc635adb2e96dd83367bb6eff
SHA5125e1bfc6873524d370f011bc014fa1064f88d9ba42ff74d26d70c50d66c5b3d32f28884474f1b3e2afd17e331b84e618eb34d04c81885dc60e32bfcc345ed9f26
-
Filesize
185KB
MD5a667dba983a7e284c49747041fd064bd
SHA1ad818971b77218a2443700f1d06722044aa1dcad
SHA2566f419641c4acde226e0d58c3129b938963526192f0dddefbec143c7bce66414d
SHA512142ff08c74845e52db3334592c10f14b0724d44bed13a0ebb6ac277379d81f3709826e43e3862bf870aff5009a5ae12f36992c4c4a02b534a59b673bc08afe6d
-
Filesize
185KB
MD5a667dba983a7e284c49747041fd064bd
SHA1ad818971b77218a2443700f1d06722044aa1dcad
SHA2566f419641c4acde226e0d58c3129b938963526192f0dddefbec143c7bce66414d
SHA512142ff08c74845e52db3334592c10f14b0724d44bed13a0ebb6ac277379d81f3709826e43e3862bf870aff5009a5ae12f36992c4c4a02b534a59b673bc08afe6d