Analysis
-
max time kernel
153s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 09:43
Static task
static1
Behavioral task
behavioral1
Sample
e933a36f504731dcbfa5ec020c3ed54a7606dd8cf62246bc34f91a2545f95ab3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e933a36f504731dcbfa5ec020c3ed54a7606dd8cf62246bc34f91a2545f95ab3.exe
Resource
win10v2004-20220812-en
General
-
Target
e933a36f504731dcbfa5ec020c3ed54a7606dd8cf62246bc34f91a2545f95ab3.exe
-
Size
333KB
-
MD5
0d618d4200080848e2018bd8af4e2d70
-
SHA1
347dab9387e4d5dc6306b5a5fe7a72b84dcff36e
-
SHA256
e933a36f504731dcbfa5ec020c3ed54a7606dd8cf62246bc34f91a2545f95ab3
-
SHA512
87f4fb2e18df2a94fd511f538f1fa0ff5475fd6e44d0144045204a55c22fe17c87a6e232c73b39620cb992eecdfd922185458d041a194376bd2f0cf39fa63c67
-
SSDEEP
6144:5sOXev74zue74KwdTueIr6SLFdVB43K7H9DSbqLtFF3bJnznBnOniy:50te8luvzZdMeAgddzBOiy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2856 irux.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\Currentversion\Run irux.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{176762F4-556D-BCA0-3AE4-8903F7119301} = "C:\\Users\\Admin\\AppData\\Roaming\\Koevji\\irux.exe" irux.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3252 set thread context of 4968 3252 e933a36f504731dcbfa5ec020c3ed54a7606dd8cf62246bc34f91a2545f95ab3.exe 84 -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe 2856 irux.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3252 wrote to memory of 2856 3252 e933a36f504731dcbfa5ec020c3ed54a7606dd8cf62246bc34f91a2545f95ab3.exe 83 PID 3252 wrote to memory of 2856 3252 e933a36f504731dcbfa5ec020c3ed54a7606dd8cf62246bc34f91a2545f95ab3.exe 83 PID 3252 wrote to memory of 2856 3252 e933a36f504731dcbfa5ec020c3ed54a7606dd8cf62246bc34f91a2545f95ab3.exe 83 PID 2856 wrote to memory of 2848 2856 irux.exe 44 PID 2856 wrote to memory of 2848 2856 irux.exe 44 PID 2856 wrote to memory of 2848 2856 irux.exe 44 PID 2856 wrote to memory of 2848 2856 irux.exe 44 PID 2856 wrote to memory of 2848 2856 irux.exe 44 PID 2856 wrote to memory of 2868 2856 irux.exe 48 PID 2856 wrote to memory of 2868 2856 irux.exe 48 PID 2856 wrote to memory of 2868 2856 irux.exe 48 PID 2856 wrote to memory of 2868 2856 irux.exe 48 PID 2856 wrote to memory of 2868 2856 irux.exe 48 PID 2856 wrote to memory of 2972 2856 irux.exe 47 PID 2856 wrote to memory of 2972 2856 irux.exe 47 PID 2856 wrote to memory of 2972 2856 irux.exe 47 PID 2856 wrote to memory of 2972 2856 irux.exe 47 PID 2856 wrote to memory of 2972 2856 irux.exe 47 PID 2856 wrote to memory of 744 2856 irux.exe 46 PID 2856 wrote to memory of 744 2856 irux.exe 46 PID 2856 wrote to memory of 744 2856 irux.exe 46 PID 2856 wrote to memory of 744 2856 irux.exe 46 PID 2856 wrote to memory of 744 2856 irux.exe 46 PID 2856 wrote to memory of 3088 2856 irux.exe 49 PID 2856 wrote to memory of 3088 2856 irux.exe 49 PID 2856 wrote to memory of 3088 2856 irux.exe 49 PID 2856 wrote to memory of 3088 2856 irux.exe 49 PID 2856 wrote to memory of 3088 2856 irux.exe 49 PID 2856 wrote to memory of 3292 2856 irux.exe 56 PID 2856 wrote to memory of 3292 2856 irux.exe 56 PID 2856 wrote to memory of 3292 2856 irux.exe 56 PID 2856 wrote to memory of 3292 2856 irux.exe 56 PID 2856 wrote to memory of 3292 2856 irux.exe 56 PID 2856 wrote to memory of 3396 2856 irux.exe 54 PID 2856 wrote to memory of 3396 2856 irux.exe 54 PID 2856 wrote to memory of 3396 2856 irux.exe 54 PID 2856 wrote to memory of 3396 2856 irux.exe 54 PID 2856 wrote to memory of 3396 2856 irux.exe 54 PID 2856 wrote to memory of 3460 2856 irux.exe 50 PID 2856 wrote to memory of 3460 2856 irux.exe 50 PID 2856 wrote to memory of 3460 2856 irux.exe 50 PID 2856 wrote to memory of 3460 2856 irux.exe 50 PID 2856 wrote to memory of 3460 2856 irux.exe 50 PID 2856 wrote to memory of 3548 2856 irux.exe 53 PID 2856 wrote to memory of 3548 2856 irux.exe 53 PID 2856 wrote to memory of 3548 2856 irux.exe 53 PID 2856 wrote to memory of 3548 2856 irux.exe 53 PID 2856 wrote to memory of 3548 2856 irux.exe 53 PID 2856 wrote to memory of 3768 2856 irux.exe 52 PID 2856 wrote to memory of 3768 2856 irux.exe 52 PID 2856 wrote to memory of 3768 2856 irux.exe 52 PID 2856 wrote to memory of 3768 2856 irux.exe 52 PID 2856 wrote to memory of 3768 2856 irux.exe 52 PID 2856 wrote to memory of 4764 2856 irux.exe 57 PID 2856 wrote to memory of 4764 2856 irux.exe 57 PID 2856 wrote to memory of 4764 2856 irux.exe 57 PID 2856 wrote to memory of 4764 2856 irux.exe 57 PID 2856 wrote to memory of 4764 2856 irux.exe 57 PID 2856 wrote to memory of 3840 2856 irux.exe 71 PID 2856 wrote to memory of 3840 2856 irux.exe 71 PID 2856 wrote to memory of 3840 2856 irux.exe 71 PID 2856 wrote to memory of 3840 2856 irux.exe 71 PID 2856 wrote to memory of 3840 2856 irux.exe 71 PID 2856 wrote to memory of 3252 2856 irux.exe 82
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2848
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\e933a36f504731dcbfa5ec020c3ed54a7606dd8cf62246bc34f91a2545f95ab3.exe"C:\Users\Admin\AppData\Local\Temp\e933a36f504731dcbfa5ec020c3ed54a7606dd8cf62246bc34f91a2545f95ab3.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Roaming\Koevji\irux.exe"C:\Users\Admin\AppData\Roaming\Koevji\irux.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2856
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp4180d4f2.bat"3⤵PID:4968
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3088
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3460
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3768
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3548
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3396
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3292
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4764
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:3840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5a4ee32d042a94f925d279ed26036b6de
SHA1486e45cea735ab3e29395e313551ac1174fe8af0
SHA256b16f2ad991c6f7fc809dc6358345f552128b3ceb00b26a479c9a3e5836eaed93
SHA51208099438abac149a5135bd72e88edf2a120b450a33a92e6c5b79b4ab27b5d1816b9ab1de119452e1ea8882dbbf5a0d9e7e242e6bab844a4b125d272b2fa7fcf3
-
Filesize
333KB
MD59db6cc51c093e533cde9bbf564921489
SHA1d6c55d29bfeed5ba55f6e2a2a91ffa13f6d1a303
SHA25660a28940074f6241a8401c7e70223499e232cea4956a131546f539670eaef2cf
SHA5122e04bba99cead48cab68ff614b409344b3151a9dc24eaf1cb3947df5a0e9a3e780ec02a357bb09fb1c289f32a39236e6cc3ee7de386573a1feafa6375576c7d1
-
Filesize
333KB
MD59db6cc51c093e533cde9bbf564921489
SHA1d6c55d29bfeed5ba55f6e2a2a91ffa13f6d1a303
SHA25660a28940074f6241a8401c7e70223499e232cea4956a131546f539670eaef2cf
SHA5122e04bba99cead48cab68ff614b409344b3151a9dc24eaf1cb3947df5a0e9a3e780ec02a357bb09fb1c289f32a39236e6cc3ee7de386573a1feafa6375576c7d1