Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2022 01:08

General

  • Target

    ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe

  • Size

    185KB

  • MD5

    0f42113e3b660af93e5fef09615cb727

  • SHA1

    be1f82b12dbc572f29516cef5859bc75024b52d5

  • SHA256

    ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8

  • SHA512

    af12253e930ef35594a5c600ae1da977251c57b9c45e503ec6cf2c220a65e550e9a3b3e0c2f367b23b3a1f29471f01bf7418c97033758dd544cb5281f30f7578

  • SSDEEP

    3072:mvRA50GP0vJ1uD8j6LqNPWWTBp1YsS+NSfXPc8/5/u0G:90RELqZWW9vhxsPfNu0

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1396
      • C:\Users\Admin\AppData\Local\Temp\ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe
        "C:\Users\Admin\AppData\Local\Temp\ab4d880bb698151777dbb02bec32450fcecf12c5dd9d2f56f05a1b7c4f6e47d8.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:992
        • C:\Users\Admin\AppData\Roaming\Kyiku\axpo.exe
          "C:\Users\Admin\AppData\Roaming\Kyiku\axpo.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:276
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpb226c96e.bat"
          3⤵
          • Deletes itself
          • Suspicious use of AdjustPrivilegeToken
          PID:580
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1332
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1240
        • C:\Program Files\Windows Mail\WinMail.exe
          "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
          1⤵
          • NTFS ADS
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1216
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1940
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:1700
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:1664
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:1196
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:1584

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\tmpb226c96e.bat

                    Filesize

                    307B

                    MD5

                    617f0e4da19f4ff19823feea634c6906

                    SHA1

                    42d5ff24495f0bc00b9c8f0936ae167acad20a24

                    SHA256

                    80cb829abfa86191cd250d557da5d59ae519779741d5cf0376fd76ead474786a

                    SHA512

                    93a41c10845ffcc5c13f9baf8248a324d071adef6d267175afcc9305804f9bef175534c94ba6ff1d06ce19f665639d83f551739e8a6a8899beed43621b40447e

                  • C:\Users\Admin\AppData\Roaming\Kyiku\axpo.exe

                    Filesize

                    185KB

                    MD5

                    a667dba983a7e284c49747041fd064bd

                    SHA1

                    ad818971b77218a2443700f1d06722044aa1dcad

                    SHA256

                    6f419641c4acde226e0d58c3129b938963526192f0dddefbec143c7bce66414d

                    SHA512

                    142ff08c74845e52db3334592c10f14b0724d44bed13a0ebb6ac277379d81f3709826e43e3862bf870aff5009a5ae12f36992c4c4a02b534a59b673bc08afe6d

                  • C:\Users\Admin\AppData\Roaming\Kyiku\axpo.exe

                    Filesize

                    185KB

                    MD5

                    a667dba983a7e284c49747041fd064bd

                    SHA1

                    ad818971b77218a2443700f1d06722044aa1dcad

                    SHA256

                    6f419641c4acde226e0d58c3129b938963526192f0dddefbec143c7bce66414d

                    SHA512

                    142ff08c74845e52db3334592c10f14b0724d44bed13a0ebb6ac277379d81f3709826e43e3862bf870aff5009a5ae12f36992c4c4a02b534a59b673bc08afe6d

                  • C:\Users\Admin\AppData\Roaming\Ywaqud\uwqy.opy

                    Filesize

                    4KB

                    MD5

                    58b9be8992865fa19df77aba1ee06e08

                    SHA1

                    4e9e5d2392ed29166f5f5b11f3d4a8bbe34ae933

                    SHA256

                    d65b673196df55fc567b9d5921d26a0e0c799a4cc635adb2e96dd83367bb6eff

                    SHA512

                    5e1bfc6873524d370f011bc014fa1064f88d9ba42ff74d26d70c50d66c5b3d32f28884474f1b3e2afd17e331b84e618eb34d04c81885dc60e32bfcc345ed9f26

                  • \Users\Admin\AppData\Roaming\Kyiku\axpo.exe

                    Filesize

                    185KB

                    MD5

                    a667dba983a7e284c49747041fd064bd

                    SHA1

                    ad818971b77218a2443700f1d06722044aa1dcad

                    SHA256

                    6f419641c4acde226e0d58c3129b938963526192f0dddefbec143c7bce66414d

                    SHA512

                    142ff08c74845e52db3334592c10f14b0724d44bed13a0ebb6ac277379d81f3709826e43e3862bf870aff5009a5ae12f36992c4c4a02b534a59b673bc08afe6d

                  • \Users\Admin\AppData\Roaming\Kyiku\axpo.exe

                    Filesize

                    185KB

                    MD5

                    a667dba983a7e284c49747041fd064bd

                    SHA1

                    ad818971b77218a2443700f1d06722044aa1dcad

                    SHA256

                    6f419641c4acde226e0d58c3129b938963526192f0dddefbec143c7bce66414d

                    SHA512

                    142ff08c74845e52db3334592c10f14b0724d44bed13a0ebb6ac277379d81f3709826e43e3862bf870aff5009a5ae12f36992c4c4a02b534a59b673bc08afe6d

                  • memory/276-93-0x0000000000400000-0x0000000000462000-memory.dmp

                    Filesize

                    392KB

                  • memory/276-259-0x0000000000400000-0x0000000000462000-memory.dmp

                    Filesize

                    392KB

                  • memory/276-62-0x0000000000400000-0x0000000000462000-memory.dmp

                    Filesize

                    392KB

                  • memory/276-63-0x00000000021F0000-0x0000000002252000-memory.dmp

                    Filesize

                    392KB

                  • memory/580-136-0x0000000000050000-0x0000000000086000-memory.dmp

                    Filesize

                    216KB

                  • memory/580-167-0x0000000000050000-0x0000000000086000-memory.dmp

                    Filesize

                    216KB

                  • memory/580-134-0x0000000000050000-0x0000000000086000-memory.dmp

                    Filesize

                    216KB

                  • memory/580-132-0x0000000000050000-0x0000000000086000-memory.dmp

                    Filesize

                    216KB

                  • memory/580-130-0x0000000000050000-0x0000000000086000-memory.dmp

                    Filesize

                    216KB

                  • memory/580-128-0x0000000000050000-0x0000000000086000-memory.dmp

                    Filesize

                    216KB

                  • memory/580-126-0x0000000000050000-0x0000000000086000-memory.dmp

                    Filesize

                    216KB

                  • memory/580-121-0x0000000000050000-0x0000000000086000-memory.dmp

                    Filesize

                    216KB

                  • memory/580-120-0x0000000000050000-0x0000000000086000-memory.dmp

                    Filesize

                    216KB

                  • memory/580-119-0x0000000000050000-0x0000000000086000-memory.dmp

                    Filesize

                    216KB

                  • memory/580-117-0x0000000000050000-0x0000000000086000-memory.dmp

                    Filesize

                    216KB

                  • memory/580-252-0x0000000000050000-0x0000000000086000-memory.dmp

                    Filesize

                    216KB

                  • memory/992-90-0x00000000026F0000-0x0000000002726000-memory.dmp

                    Filesize

                    216KB

                  • memory/992-55-0x00000000021F0000-0x0000000002252000-memory.dmp

                    Filesize

                    392KB

                  • memory/992-88-0x00000000026F0000-0x0000000002726000-memory.dmp

                    Filesize

                    216KB

                  • memory/992-89-0x00000000026F0000-0x0000000002726000-memory.dmp

                    Filesize

                    216KB

                  • memory/992-54-0x0000000000400000-0x0000000000462000-memory.dmp

                    Filesize

                    392KB

                  • memory/992-87-0x00000000026F0000-0x0000000002726000-memory.dmp

                    Filesize

                    216KB

                  • memory/992-92-0x0000000000400000-0x0000000000462000-memory.dmp

                    Filesize

                    392KB

                  • memory/992-86-0x00000000026F0000-0x0000000002726000-memory.dmp

                    Filesize

                    216KB

                  • memory/992-94-0x00000000026F0000-0x0000000002752000-memory.dmp

                    Filesize

                    392KB

                  • memory/992-125-0x00000000026F0000-0x0000000002726000-memory.dmp

                    Filesize

                    216KB

                  • memory/992-123-0x0000000000400000-0x0000000000462000-memory.dmp

                    Filesize

                    392KB

                  • memory/992-57-0x0000000000400000-0x0000000000462000-memory.dmp

                    Filesize

                    392KB

                  • memory/992-56-0x0000000076561000-0x0000000076563000-memory.dmp

                    Filesize

                    8KB

                  • memory/1216-112-0x0000000003DD0000-0x0000000003E06000-memory.dmp

                    Filesize

                    216KB

                  • memory/1216-113-0x0000000003DD0000-0x0000000003E06000-memory.dmp

                    Filesize

                    216KB

                  • memory/1216-110-0x0000000003DD0000-0x0000000003E06000-memory.dmp

                    Filesize

                    216KB

                  • memory/1216-111-0x0000000003DD0000-0x0000000003E06000-memory.dmp

                    Filesize

                    216KB

                  • memory/1216-102-0x00000000023B0000-0x00000000023C0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1216-96-0x0000000000260000-0x0000000000270000-memory.dmp

                    Filesize

                    64KB

                  • memory/1216-95-0x000007FEF6641000-0x000007FEF6643000-memory.dmp

                    Filesize

                    8KB

                  • memory/1216-91-0x000007FEFBF81000-0x000007FEFBF83000-memory.dmp

                    Filesize

                    8KB

                  • memory/1240-69-0x0000000001DD0000-0x0000000001E06000-memory.dmp

                    Filesize

                    216KB

                  • memory/1240-66-0x0000000001DD0000-0x0000000001E06000-memory.dmp

                    Filesize

                    216KB

                  • memory/1240-68-0x0000000001DD0000-0x0000000001E06000-memory.dmp

                    Filesize

                    216KB

                  • memory/1240-70-0x0000000001DD0000-0x0000000001E06000-memory.dmp

                    Filesize

                    216KB

                  • memory/1240-71-0x0000000001DD0000-0x0000000001E06000-memory.dmp

                    Filesize

                    216KB

                  • memory/1332-74-0x0000000001C30000-0x0000000001C66000-memory.dmp

                    Filesize

                    216KB

                  • memory/1332-76-0x0000000001C30000-0x0000000001C66000-memory.dmp

                    Filesize

                    216KB

                  • memory/1332-75-0x0000000001C30000-0x0000000001C66000-memory.dmp

                    Filesize

                    216KB

                  • memory/1332-77-0x0000000001C30000-0x0000000001C66000-memory.dmp

                    Filesize

                    216KB

                  • memory/1396-80-0x00000000025C0000-0x00000000025F6000-memory.dmp

                    Filesize

                    216KB

                  • memory/1396-81-0x00000000025C0000-0x00000000025F6000-memory.dmp

                    Filesize

                    216KB

                  • memory/1396-82-0x00000000025C0000-0x00000000025F6000-memory.dmp

                    Filesize

                    216KB

                  • memory/1396-83-0x00000000025C0000-0x00000000025F6000-memory.dmp

                    Filesize

                    216KB