Analysis

  • max time kernel
    151s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:59

General

  • Target

    1df466615b70a7197e894b3ec333ce134593cb6932c74dcdf6491e3c5f7224a1.exe

  • Size

    341KB

  • MD5

    fe7d0c5786b24efc2b7e6520a24ccf4c

  • SHA1

    be0f2a8a108426c514d3c4d5819b87b921b41e52

  • SHA256

    1df466615b70a7197e894b3ec333ce134593cb6932c74dcdf6491e3c5f7224a1

  • SHA512

    bfc1e350ea9365f94183db17dca728a3ce89421beaef1381bb09c2e823e3765bc5563c77459767c300a79e5cacba404bfdd32b77046c99ed912d37c0dfcdee9c

  • SSDEEP

    6144:h2TX+xO9QNaDyPk9gcTher8o/xPh+PWmp2k98mrjI3s:hqXsO98a+cter8kPMxp2Jc

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\1df466615b70a7197e894b3ec333ce134593cb6932c74dcdf6491e3c5f7224a1.exe
        "C:\Users\Admin\AppData\Local\Temp\1df466615b70a7197e894b3ec333ce134593cb6932c74dcdf6491e3c5f7224a1.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Users\Admin\AppData\Local\Temp\Egwae\ynapo.exe
          "C:\Users\Admin\AppData\Local\Temp\Egwae\ynapo.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1660
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HGLDD00.bat"
          3⤵
          • Deletes itself
          PID:1560
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1184
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1128
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "115323065322713390-1977309385194970933416910796253507951431581118628-267813925"
          1⤵
            PID:532

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Egwae\ynapo.exe

            Filesize

            341KB

            MD5

            e7dd5108f005baa913ac93728a226f18

            SHA1

            c82ce62f7af5c97f9c68b41bb688007734f312f7

            SHA256

            61260a124e3006a7856d31c002ceae5fba5b4c71bc0bed6f610268b5bff46ddb

            SHA512

            ab19c8f9fe87cab5490250811c5318048302c821d2415632322c48a14c6c8b4bdca4e9829c9ec29e02b9cb2910eb19fc0fd7dedb310c424a804f1a0e77615cf0

          • C:\Users\Admin\AppData\Local\Temp\Egwae\ynapo.exe

            Filesize

            341KB

            MD5

            e7dd5108f005baa913ac93728a226f18

            SHA1

            c82ce62f7af5c97f9c68b41bb688007734f312f7

            SHA256

            61260a124e3006a7856d31c002ceae5fba5b4c71bc0bed6f610268b5bff46ddb

            SHA512

            ab19c8f9fe87cab5490250811c5318048302c821d2415632322c48a14c6c8b4bdca4e9829c9ec29e02b9cb2910eb19fc0fd7dedb310c424a804f1a0e77615cf0

          • C:\Users\Admin\AppData\Local\Temp\HGLDD00.bat

            Filesize

            282B

            MD5

            3a8990924314c9490364287b8eeae298

            SHA1

            dc400394c70c89ad5ec9abc0d99e0e74a62ff401

            SHA256

            584fa2290c61173a6272c302fced60c8ba29bb47ecf16f51eb2b7b44117788db

            SHA512

            32df25cb7bd5dfe24dc4aa09df90bf7a751295b704bda8cf2f8b8d9bafa62f83d42d8252c3d262b3fa40cb84ca03bf4ff8b1a13b1831e9d09a5c67829fb70669

          • \Users\Admin\AppData\Local\Temp\Egwae\ynapo.exe

            Filesize

            341KB

            MD5

            e7dd5108f005baa913ac93728a226f18

            SHA1

            c82ce62f7af5c97f9c68b41bb688007734f312f7

            SHA256

            61260a124e3006a7856d31c002ceae5fba5b4c71bc0bed6f610268b5bff46ddb

            SHA512

            ab19c8f9fe87cab5490250811c5318048302c821d2415632322c48a14c6c8b4bdca4e9829c9ec29e02b9cb2910eb19fc0fd7dedb310c424a804f1a0e77615cf0

          • memory/532-115-0x0000000001A90000-0x0000000001AD2000-memory.dmp

            Filesize

            264KB

          • memory/532-117-0x0000000001A90000-0x0000000001AD2000-memory.dmp

            Filesize

            264KB

          • memory/532-116-0x0000000001A90000-0x0000000001AD2000-memory.dmp

            Filesize

            264KB

          • memory/532-114-0x0000000001A90000-0x0000000001AD2000-memory.dmp

            Filesize

            264KB

          • memory/1128-68-0x0000000002010000-0x0000000002052000-memory.dmp

            Filesize

            264KB

          • memory/1128-67-0x0000000002010000-0x0000000002052000-memory.dmp

            Filesize

            264KB

          • memory/1128-69-0x0000000002010000-0x0000000002052000-memory.dmp

            Filesize

            264KB

          • memory/1128-66-0x0000000002010000-0x0000000002052000-memory.dmp

            Filesize

            264KB

          • memory/1128-64-0x0000000002010000-0x0000000002052000-memory.dmp

            Filesize

            264KB

          • memory/1184-72-0x00000000001E0000-0x0000000000222000-memory.dmp

            Filesize

            264KB

          • memory/1184-73-0x00000000001E0000-0x0000000000222000-memory.dmp

            Filesize

            264KB

          • memory/1184-74-0x00000000001E0000-0x0000000000222000-memory.dmp

            Filesize

            264KB

          • memory/1184-75-0x00000000001E0000-0x0000000000222000-memory.dmp

            Filesize

            264KB

          • memory/1212-81-0x0000000002A40000-0x0000000002A82000-memory.dmp

            Filesize

            264KB

          • memory/1212-78-0x0000000002A40000-0x0000000002A82000-memory.dmp

            Filesize

            264KB

          • memory/1212-80-0x0000000002A40000-0x0000000002A82000-memory.dmp

            Filesize

            264KB

          • memory/1212-79-0x0000000002A40000-0x0000000002A82000-memory.dmp

            Filesize

            264KB

          • memory/1560-104-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/1560-111-0x0000000000150000-0x0000000000192000-memory.dmp

            Filesize

            264KB

          • memory/1560-122-0x0000000000370000-0x00000000003B2000-memory.dmp

            Filesize

            264KB

          • memory/1560-121-0x0000000000370000-0x00000000003B2000-memory.dmp

            Filesize

            264KB

          • memory/1560-109-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/1560-110-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/1560-107-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/1560-108-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/1560-106-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/1560-96-0x0000000000150000-0x0000000000192000-memory.dmp

            Filesize

            264KB

          • memory/1560-99-0x0000000000150000-0x0000000000192000-memory.dmp

            Filesize

            264KB

          • memory/1560-98-0x0000000000150000-0x0000000000192000-memory.dmp

            Filesize

            264KB

          • memory/1560-100-0x0000000000150000-0x0000000000192000-memory.dmp

            Filesize

            264KB

          • memory/1560-101-0x0000000000175D23-mapping.dmp

          • memory/1560-105-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/1660-58-0x0000000000000000-mapping.dmp

          • memory/1740-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/1740-85-0x0000000000050000-0x0000000000092000-memory.dmp

            Filesize

            264KB

          • memory/1740-86-0x0000000000050000-0x0000000000092000-memory.dmp

            Filesize

            264KB

          • memory/1740-92-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/1740-93-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/1740-102-0x0000000000050000-0x0000000000092000-memory.dmp

            Filesize

            264KB

          • memory/1740-89-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/1740-87-0x0000000000050000-0x0000000000092000-memory.dmp

            Filesize

            264KB

          • memory/1740-84-0x0000000000050000-0x0000000000092000-memory.dmp

            Filesize

            264KB

          • memory/1740-54-0x0000000076261000-0x0000000076263000-memory.dmp

            Filesize

            8KB

          • memory/1740-56-0x0000000000400000-0x00000000004DE000-memory.dmp

            Filesize

            888KB

          • memory/1740-55-0x0000000000400000-0x00000000004DE000-memory.dmp

            Filesize

            888KB

          • memory/1740-91-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/1740-88-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB