Analysis
-
max time kernel
128s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 23:22
Static task
static1
Behavioral task
behavioral1
Sample
64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32.exe
Resource
win10v2004-20221111-en
General
-
Target
64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32.exe
-
Size
298KB
-
MD5
bc54868a08a7d4336922e40b3d18abc5
-
SHA1
f3221a414b42524d546cf51c18b0f8f239666167
-
SHA256
64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32
-
SHA512
d75204155b8f42e382ce9641216a02b28b0d2a52df7af0b4fc09988150fb92e166b70662baaf43d9f11d41b99096d35f6b10521f384b95bed3b7e5ea0465b667
-
SSDEEP
6144:MIWOkp0pvb3FQSV68oPiNLF2Y3iDczBR2TG9UD2NNasWfou:hWOkp0pTV/6fPk2Y3iDc94yu2as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 960 wyveu.exe -
Deletes itself 1 IoCs
pid Process 760 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1948 64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\{7EF78679-3FE2-58E1-2FD6-EEC11AB35C22} = "\"C:\\Users\\Admin\\AppData\\Roaming\\Qaodo\\wyveu.exe\"" explorer.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\64EF145C-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 960 wyveu.exe 960 wyveu.exe 632 explorer.exe 632 explorer.exe 632 explorer.exe 632 explorer.exe 632 explorer.exe 632 explorer.exe 632 explorer.exe 632 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 960 wyveu.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1948 64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32.exe Token: SeManageVolumePrivilege 764 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 764 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 764 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 764 WinMail.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1948 wrote to memory of 960 1948 64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32.exe 28 PID 1948 wrote to memory of 960 1948 64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32.exe 28 PID 1948 wrote to memory of 960 1948 64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32.exe 28 PID 1948 wrote to memory of 960 1948 64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32.exe 28 PID 960 wrote to memory of 632 960 wyveu.exe 29 PID 960 wrote to memory of 632 960 wyveu.exe 29 PID 960 wrote to memory of 632 960 wyveu.exe 29 PID 960 wrote to memory of 632 960 wyveu.exe 29 PID 632 wrote to memory of 1212 632 explorer.exe 15 PID 632 wrote to memory of 1212 632 explorer.exe 15 PID 632 wrote to memory of 1212 632 explorer.exe 15 PID 1948 wrote to memory of 760 1948 64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32.exe 31 PID 1948 wrote to memory of 760 1948 64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32.exe 31 PID 1948 wrote to memory of 760 1948 64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32.exe 31 PID 1948 wrote to memory of 760 1948 64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32.exe"C:\Users\Admin\AppData\Local\Temp\64238cd5ecbe797ebea9eaa90000f96146dbab085a61f132d443d1a5ebf3fe32.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Roaming\Qaodo\wyveu.exe"C:\Users\Admin\AppData\Roaming\Qaodo\wyveu.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:632
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpe7aecf64.bat"3⤵
- Deletes itself
PID:760
-
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5835d5960f81f1b5200b2344e9b9413b1
SHA1eb738e7afc549c8c1d8b4a9284a6e907a98a0ffa
SHA256b64513226a6e670e5aabde90d4b9a8aa376bf94797edf6be7f25254fe03a3640
SHA512f91811b0a2a0401ec7ed6764fadca4a21bacf0fa88d7ce791abdc8bce9f07425129a873091800f6e79a466dd7deb2d9419cedf8fb8fcbeab4b18127c1cc2a855
-
Filesize
298KB
MD50c2b7328c3d3ca6d9f5936460a58114b
SHA1af3f09807cff62c6271df2c803df895990ed85a6
SHA2560c03e890803e89d7f2cbc07d1309b2c2ad098987f6c3525c36e0ac202d20fb91
SHA512d819af05e6067e1baa045a11ed9d83565ca78c32b0715c136eeb5475977a58948e356ded40ba5008cc752b69e07c4979086f86fb4aa5e14c11a837de4e344e28
-
Filesize
298KB
MD50c2b7328c3d3ca6d9f5936460a58114b
SHA1af3f09807cff62c6271df2c803df895990ed85a6
SHA2560c03e890803e89d7f2cbc07d1309b2c2ad098987f6c3525c36e0ac202d20fb91
SHA512d819af05e6067e1baa045a11ed9d83565ca78c32b0715c136eeb5475977a58948e356ded40ba5008cc752b69e07c4979086f86fb4aa5e14c11a837de4e344e28
-
Filesize
298KB
MD50c2b7328c3d3ca6d9f5936460a58114b
SHA1af3f09807cff62c6271df2c803df895990ed85a6
SHA2560c03e890803e89d7f2cbc07d1309b2c2ad098987f6c3525c36e0ac202d20fb91
SHA512d819af05e6067e1baa045a11ed9d83565ca78c32b0715c136eeb5475977a58948e356ded40ba5008cc752b69e07c4979086f86fb4aa5e14c11a837de4e344e28