Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe
Resource
win10v2004-20220812-en
General
-
Target
d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe
-
Size
250KB
-
MD5
8e6ef4e640a0852cb8f31d12d409544a
-
SHA1
5ba3ae0604c81b69e5aeda655b6b8d2ab96be7ed
-
SHA256
d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350
-
SHA512
5f897ca3c389d8c6a1c49a09024cacf45bab2a3d1e656b4956db4a352ef3bbcf7be3d995963f4d83b4c0c05e1f6cc0fae90b80fb4fa5446469986e3835bc73e6
-
SSDEEP
6144:pA4A4A3clElclc8UGun1TBnIrre5H2VN6D:7ciu11nfsN6D
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1712 etihe.exe 1996 etihe.exe -
Deletes itself 1 IoCs
pid Process 1936 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1644 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 1644 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run etihe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{A285FF84-5267-7370-678F-12A099B8015D} = "C:\\Users\\Admin\\AppData\\Roaming\\Byemzi\\etihe.exe" etihe.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1680 set thread context of 1644 1680 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 28 PID 1712 set thread context of 1996 1712 etihe.exe 30 -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe 1996 etihe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 1644 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1680 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 1712 etihe.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1644 1680 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 28 PID 1680 wrote to memory of 1644 1680 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 28 PID 1680 wrote to memory of 1644 1680 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 28 PID 1680 wrote to memory of 1644 1680 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 28 PID 1680 wrote to memory of 1644 1680 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 28 PID 1680 wrote to memory of 1644 1680 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 28 PID 1680 wrote to memory of 1644 1680 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 28 PID 1680 wrote to memory of 1644 1680 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 28 PID 1680 wrote to memory of 1644 1680 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 28 PID 1644 wrote to memory of 1712 1644 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 29 PID 1644 wrote to memory of 1712 1644 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 29 PID 1644 wrote to memory of 1712 1644 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 29 PID 1644 wrote to memory of 1712 1644 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 29 PID 1712 wrote to memory of 1996 1712 etihe.exe 30 PID 1712 wrote to memory of 1996 1712 etihe.exe 30 PID 1712 wrote to memory of 1996 1712 etihe.exe 30 PID 1712 wrote to memory of 1996 1712 etihe.exe 30 PID 1712 wrote to memory of 1996 1712 etihe.exe 30 PID 1712 wrote to memory of 1996 1712 etihe.exe 30 PID 1712 wrote to memory of 1996 1712 etihe.exe 30 PID 1712 wrote to memory of 1996 1712 etihe.exe 30 PID 1712 wrote to memory of 1996 1712 etihe.exe 30 PID 1644 wrote to memory of 1936 1644 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 31 PID 1644 wrote to memory of 1936 1644 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 31 PID 1644 wrote to memory of 1936 1644 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 31 PID 1644 wrote to memory of 1936 1644 d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe 31 PID 1996 wrote to memory of 1232 1996 etihe.exe 20 PID 1996 wrote to memory of 1232 1996 etihe.exe 20 PID 1996 wrote to memory of 1232 1996 etihe.exe 20 PID 1996 wrote to memory of 1232 1996 etihe.exe 20 PID 1996 wrote to memory of 1232 1996 etihe.exe 20 PID 1996 wrote to memory of 1320 1996 etihe.exe 19 PID 1996 wrote to memory of 1320 1996 etihe.exe 19 PID 1996 wrote to memory of 1320 1996 etihe.exe 19 PID 1996 wrote to memory of 1320 1996 etihe.exe 19 PID 1996 wrote to memory of 1320 1996 etihe.exe 19 PID 1996 wrote to memory of 1384 1996 etihe.exe 18 PID 1996 wrote to memory of 1384 1996 etihe.exe 18 PID 1996 wrote to memory of 1384 1996 etihe.exe 18 PID 1996 wrote to memory of 1384 1996 etihe.exe 18 PID 1996 wrote to memory of 1384 1996 etihe.exe 18 PID 1996 wrote to memory of 268 1996 etihe.exe 33 PID 1996 wrote to memory of 268 1996 etihe.exe 33 PID 1996 wrote to memory of 268 1996 etihe.exe 33 PID 1996 wrote to memory of 268 1996 etihe.exe 33 PID 1996 wrote to memory of 268 1996 etihe.exe 33 PID 1996 wrote to memory of 1520 1996 etihe.exe 34 PID 1996 wrote to memory of 1520 1996 etihe.exe 34 PID 1996 wrote to memory of 1520 1996 etihe.exe 34 PID 1996 wrote to memory of 1520 1996 etihe.exe 34 PID 1996 wrote to memory of 1520 1996 etihe.exe 34 PID 1996 wrote to memory of 680 1996 etihe.exe 35 PID 1996 wrote to memory of 680 1996 etihe.exe 35 PID 1996 wrote to memory of 680 1996 etihe.exe 35 PID 1996 wrote to memory of 680 1996 etihe.exe 35 PID 1996 wrote to memory of 680 1996 etihe.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe"C:\Users\Admin\AppData\Local\Temp\d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe"C:\Users\Admin\AppData\Local\Temp\d1ec46503692a455ece4aacb38a8bcdd46ea26da5b4ec028b1230cd940ca3350.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Roaming\Byemzi\etihe.exe"C:\Users\Admin\AppData\Roaming\Byemzi\etihe.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Roaming\Byemzi\etihe.exe"C:\Users\Admin\AppData\Roaming\Byemzi\etihe.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp0218642a.bat"4⤵
- Deletes itself
PID:1936
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1320
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1232
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:268
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1520
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:680
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5e9903ba03220a5882a5f47507bfa6c3e
SHA103ef16fc0f93ffb71a50ddc62584e820f4faa633
SHA2566df16ed3042b4c0d725bd993c0d2b38506a95bda6fdf2fe022e03c9958962f93
SHA5126330f48ddef61131872c7a4753337871bc322a7e3e2716f5cdae5c7fd63a62ee5f21dc440e9ccf6421c14e37d1f6bf369bc8e9b24bdafc8efa4195d64542cd21
-
Filesize
250KB
MD5028e3d416e65bb88fc5f423879e36d74
SHA1b0ba10b90d9c0ed6244a52cb15b8e5c061ded53b
SHA256e1185197338bf8956544a2238a940770b1653bbde05f974774b146cbe43268d1
SHA5121d928c60209d2a6f08259dae985ab5444aadd12b971772af39f1bd3eb8b81ba8ecc5bba4e5804efa5778c5674c195aac4b559701af4e199dcc165b1316c6bad3
-
Filesize
250KB
MD5028e3d416e65bb88fc5f423879e36d74
SHA1b0ba10b90d9c0ed6244a52cb15b8e5c061ded53b
SHA256e1185197338bf8956544a2238a940770b1653bbde05f974774b146cbe43268d1
SHA5121d928c60209d2a6f08259dae985ab5444aadd12b971772af39f1bd3eb8b81ba8ecc5bba4e5804efa5778c5674c195aac4b559701af4e199dcc165b1316c6bad3
-
Filesize
250KB
MD5028e3d416e65bb88fc5f423879e36d74
SHA1b0ba10b90d9c0ed6244a52cb15b8e5c061ded53b
SHA256e1185197338bf8956544a2238a940770b1653bbde05f974774b146cbe43268d1
SHA5121d928c60209d2a6f08259dae985ab5444aadd12b971772af39f1bd3eb8b81ba8ecc5bba4e5804efa5778c5674c195aac4b559701af4e199dcc165b1316c6bad3
-
Filesize
250KB
MD5028e3d416e65bb88fc5f423879e36d74
SHA1b0ba10b90d9c0ed6244a52cb15b8e5c061ded53b
SHA256e1185197338bf8956544a2238a940770b1653bbde05f974774b146cbe43268d1
SHA5121d928c60209d2a6f08259dae985ab5444aadd12b971772af39f1bd3eb8b81ba8ecc5bba4e5804efa5778c5674c195aac4b559701af4e199dcc165b1316c6bad3
-
Filesize
250KB
MD5028e3d416e65bb88fc5f423879e36d74
SHA1b0ba10b90d9c0ed6244a52cb15b8e5c061ded53b
SHA256e1185197338bf8956544a2238a940770b1653bbde05f974774b146cbe43268d1
SHA5121d928c60209d2a6f08259dae985ab5444aadd12b971772af39f1bd3eb8b81ba8ecc5bba4e5804efa5778c5674c195aac4b559701af4e199dcc165b1316c6bad3