Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 09:21
Static task
static1
Behavioral task
behavioral1
Sample
f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe
Resource
win10v2004-20220901-en
General
-
Target
f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe
-
Size
260KB
-
MD5
0de177ac36fadd32af63e5f8a78da5ba
-
SHA1
4e59c65d3de0b57b11cf67e7b2d3bc2a07683b31
-
SHA256
f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1
-
SHA512
d4792b3a5d933da71c5289888cc0ea1977b71647f7a3fb2e09cdeb1bfce959d5e252f972f2814ffb26bd6414a28020fac0bf4a5a3827d11bb9a64290932d9750
-
SSDEEP
6144:NzK1gF5AC2z44Em6Tvr9mP/qB8i0Ea0heJQ2C6z:jDw44Emqro3qB8RwhODZz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1952 elilk.exe -
Deletes itself 1 IoCs
pid Process 756 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\Currentversion\Run elilk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Vytyupi = "C:\\Users\\Admin\\AppData\\Roaming\\Veaxym\\elilk.exe" elilk.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1968 set thread context of 756 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\36003DB8-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe 1952 elilk.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeSecurityPrivilege 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe Token: SeSecurityPrivilege 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe Token: SeSecurityPrivilege 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe Token: SeSecurityPrivilege 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe Token: SeManageVolumePrivilege 1804 WinMail.exe Token: SeSecurityPrivilege 756 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1804 WinMail.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 1952 elilk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1952 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 26 PID 1968 wrote to memory of 1952 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 26 PID 1968 wrote to memory of 1952 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 26 PID 1968 wrote to memory of 1952 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 26 PID 1952 wrote to memory of 1108 1952 elilk.exe 12 PID 1952 wrote to memory of 1108 1952 elilk.exe 12 PID 1952 wrote to memory of 1108 1952 elilk.exe 12 PID 1952 wrote to memory of 1108 1952 elilk.exe 12 PID 1952 wrote to memory of 1108 1952 elilk.exe 12 PID 1952 wrote to memory of 1156 1952 elilk.exe 18 PID 1952 wrote to memory of 1156 1952 elilk.exe 18 PID 1952 wrote to memory of 1156 1952 elilk.exe 18 PID 1952 wrote to memory of 1156 1952 elilk.exe 18 PID 1952 wrote to memory of 1156 1952 elilk.exe 18 PID 1952 wrote to memory of 1192 1952 elilk.exe 13 PID 1952 wrote to memory of 1192 1952 elilk.exe 13 PID 1952 wrote to memory of 1192 1952 elilk.exe 13 PID 1952 wrote to memory of 1192 1952 elilk.exe 13 PID 1952 wrote to memory of 1192 1952 elilk.exe 13 PID 1952 wrote to memory of 1968 1952 elilk.exe 25 PID 1952 wrote to memory of 1968 1952 elilk.exe 25 PID 1952 wrote to memory of 1968 1952 elilk.exe 25 PID 1952 wrote to memory of 1968 1952 elilk.exe 25 PID 1952 wrote to memory of 1968 1952 elilk.exe 25 PID 1952 wrote to memory of 1804 1952 elilk.exe 27 PID 1952 wrote to memory of 1804 1952 elilk.exe 27 PID 1952 wrote to memory of 1804 1952 elilk.exe 27 PID 1952 wrote to memory of 1804 1952 elilk.exe 27 PID 1952 wrote to memory of 1804 1952 elilk.exe 27 PID 1968 wrote to memory of 756 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 28 PID 1968 wrote to memory of 756 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 28 PID 1968 wrote to memory of 756 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 28 PID 1968 wrote to memory of 756 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 28 PID 1968 wrote to memory of 756 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 28 PID 1968 wrote to memory of 756 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 28 PID 1968 wrote to memory of 756 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 28 PID 1968 wrote to memory of 756 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 28 PID 1968 wrote to memory of 756 1968 f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe 28 PID 1952 wrote to memory of 948 1952 elilk.exe 29 PID 1952 wrote to memory of 948 1952 elilk.exe 29 PID 1952 wrote to memory of 948 1952 elilk.exe 29 PID 1952 wrote to memory of 948 1952 elilk.exe 29 PID 1952 wrote to memory of 948 1952 elilk.exe 29 PID 1952 wrote to memory of 1688 1952 elilk.exe 30 PID 1952 wrote to memory of 1688 1952 elilk.exe 30 PID 1952 wrote to memory of 1688 1952 elilk.exe 30 PID 1952 wrote to memory of 1688 1952 elilk.exe 30 PID 1952 wrote to memory of 1688 1952 elilk.exe 30 PID 1952 wrote to memory of 612 1952 elilk.exe 31 PID 1952 wrote to memory of 612 1952 elilk.exe 31 PID 1952 wrote to memory of 612 1952 elilk.exe 31 PID 1952 wrote to memory of 612 1952 elilk.exe 31 PID 1952 wrote to memory of 612 1952 elilk.exe 31 PID 1952 wrote to memory of 1224 1952 elilk.exe 32 PID 1952 wrote to memory of 1224 1952 elilk.exe 32 PID 1952 wrote to memory of 1224 1952 elilk.exe 32 PID 1952 wrote to memory of 1224 1952 elilk.exe 32 PID 1952 wrote to memory of 1224 1952 elilk.exe 32 PID 1952 wrote to memory of 336 1952 elilk.exe 33 PID 1952 wrote to memory of 336 1952 elilk.exe 33 PID 1952 wrote to memory of 336 1952 elilk.exe 33 PID 1952 wrote to memory of 336 1952 elilk.exe 33 PID 1952 wrote to memory of 336 1952 elilk.exe 33 PID 1952 wrote to memory of 1792 1952 elilk.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe"C:\Users\Admin\AppData\Local\Temp\f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\Veaxym\elilk.exe"C:\Users\Admin\AppData\Roaming\Veaxym\elilk.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp385c3ea4.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1804
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "2049233077964267822225697450-127024363732839615-1590310072-470065834552501639"1⤵PID:948
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1688
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:612
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1224
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:336
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD545d8b648fbc9a71cb2af6d9a64afbf17
SHA108f08a0d16ab6fd68d812c858c4004f266ed9879
SHA256796612e04951cff70ab34a569c6ece1c0bb871547e6b930091d5e7dda76d8123
SHA512733e5791324f5f7f96b3c6d362e6ef3645f2585b525522f5902fc2d6877f51e4defaff2e6a7f86805fd36ae56a08eff38029d015fc7e3a17379f7449fbbca507
-
Filesize
260KB
MD5c864f67c7249633321e955681d5d7b02
SHA1e09b3c4cdb1593a1ccda743eeb9ca796004a6f87
SHA256ff38dd540daa365b3ebc6577bfd1eb0b00f3a1f39f1adc8c1f2e0dab942e2187
SHA512ab6c3d391da61e4dac43537948adc84b3f64ae51599e3009389c6313b2592497a22ba669040c4cc6de82bd143b3a791ba6bf11106bbc471a331f039176f0e790
-
Filesize
260KB
MD5c864f67c7249633321e955681d5d7b02
SHA1e09b3c4cdb1593a1ccda743eeb9ca796004a6f87
SHA256ff38dd540daa365b3ebc6577bfd1eb0b00f3a1f39f1adc8c1f2e0dab942e2187
SHA512ab6c3d391da61e4dac43537948adc84b3f64ae51599e3009389c6313b2592497a22ba669040c4cc6de82bd143b3a791ba6bf11106bbc471a331f039176f0e790
-
Filesize
421B
MD5fc5d93560725c0cc4b4f938272d1012b
SHA180f7d783f09f5132e002d206b357a2cf3da00a47
SHA25698e8144d500306cea92634d84acf98ab19c258afdbf30c007d225b0be57e1097
SHA512447417885f9477dfbec1750fddaf4966345ea29184149533c8e55c24c2e5e344ec994b9d4bb7c8949eea174b94223419d9bd297e4c8cdf363b492960a564dfd3
-
Filesize
260KB
MD5c864f67c7249633321e955681d5d7b02
SHA1e09b3c4cdb1593a1ccda743eeb9ca796004a6f87
SHA256ff38dd540daa365b3ebc6577bfd1eb0b00f3a1f39f1adc8c1f2e0dab942e2187
SHA512ab6c3d391da61e4dac43537948adc84b3f64ae51599e3009389c6313b2592497a22ba669040c4cc6de82bd143b3a791ba6bf11106bbc471a331f039176f0e790
-
Filesize
260KB
MD5c864f67c7249633321e955681d5d7b02
SHA1e09b3c4cdb1593a1ccda743eeb9ca796004a6f87
SHA256ff38dd540daa365b3ebc6577bfd1eb0b00f3a1f39f1adc8c1f2e0dab942e2187
SHA512ab6c3d391da61e4dac43537948adc84b3f64ae51599e3009389c6313b2592497a22ba669040c4cc6de82bd143b3a791ba6bf11106bbc471a331f039176f0e790