Analysis
-
max time kernel
177s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:43
Behavioral task
behavioral1
Sample
79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe
Resource
win10v2004-20220901-en
General
-
Target
79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe
-
Size
170KB
-
MD5
37bacce71c6e6b63bf2a530218e5eee5
-
SHA1
e8c09b744d0b4d4b6901baf8b8ba2c9a74629084
-
SHA256
79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b
-
SHA512
bd2a84d445d45ac3ec6a7cc912e7e00257975152589ee5f1874c9d268df80cd608e4c60aaf1c10e21ff229aee87f60198bf3d3c933bf85dec762c0564d95f89c
-
SSDEEP
3072:4BgxXODQ/j8Xqzb+nv/UL+MioEv3RQH35uk4ZwBpXSIcgaFFw5PbCo:cej8usULH6vhQHJoZtexp
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
rali.exerali.exepid process 568 rali.exe 1304 rali.exe -
Processes:
resource yara_rule behavioral1/memory/1780-66-0x0000000000400000-0x00000000004AD000-memory.dmp upx \Users\Admin\AppData\Roaming\Eqzonu\rali.exe upx behavioral1/memory/568-77-0x0000000000400000-0x00000000004AD000-memory.dmp upx C:\Users\Admin\AppData\Roaming\Eqzonu\rali.exe upx \Users\Admin\AppData\Roaming\Eqzonu\rali.exe upx C:\Users\Admin\AppData\Roaming\Eqzonu\rali.exe upx behavioral1/memory/568-90-0x0000000000400000-0x00000000004AD000-memory.dmp upx C:\Users\Admin\AppData\Roaming\Eqzonu\rali.exe upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 988 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exepid process 960 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe 960 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
rali.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{43D00BA2-5030-484A-98FA-791B335DBD04} = "C:\\Users\\Admin\\AppData\\Roaming\\Eqzonu\\rali.exe" rali.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run rali.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exerali.exedescription pid process target process PID 1780 set thread context of 960 1780 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe PID 568 set thread context of 1304 568 rali.exe rali.exe -
Processes:
79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
rali.exepid process 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe 1304 rali.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exedescription pid process Token: SeSecurityPrivilege 960 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe Token: SeSecurityPrivilege 960 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe Token: SeSecurityPrivilege 960 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exerali.exepid process 1780 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe 568 rali.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exerali.exerali.exedescription pid process target process PID 1780 wrote to memory of 960 1780 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe PID 1780 wrote to memory of 960 1780 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe PID 1780 wrote to memory of 960 1780 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe PID 1780 wrote to memory of 960 1780 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe PID 1780 wrote to memory of 960 1780 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe PID 1780 wrote to memory of 960 1780 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe PID 1780 wrote to memory of 960 1780 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe PID 1780 wrote to memory of 960 1780 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe PID 1780 wrote to memory of 960 1780 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe PID 960 wrote to memory of 568 960 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe rali.exe PID 960 wrote to memory of 568 960 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe rali.exe PID 960 wrote to memory of 568 960 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe rali.exe PID 960 wrote to memory of 568 960 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe rali.exe PID 568 wrote to memory of 1304 568 rali.exe rali.exe PID 568 wrote to memory of 1304 568 rali.exe rali.exe PID 568 wrote to memory of 1304 568 rali.exe rali.exe PID 568 wrote to memory of 1304 568 rali.exe rali.exe PID 568 wrote to memory of 1304 568 rali.exe rali.exe PID 568 wrote to memory of 1304 568 rali.exe rali.exe PID 568 wrote to memory of 1304 568 rali.exe rali.exe PID 568 wrote to memory of 1304 568 rali.exe rali.exe PID 568 wrote to memory of 1304 568 rali.exe rali.exe PID 1304 wrote to memory of 1120 1304 rali.exe taskhost.exe PID 1304 wrote to memory of 1120 1304 rali.exe taskhost.exe PID 1304 wrote to memory of 1120 1304 rali.exe taskhost.exe PID 1304 wrote to memory of 1120 1304 rali.exe taskhost.exe PID 1304 wrote to memory of 1120 1304 rali.exe taskhost.exe PID 1304 wrote to memory of 1168 1304 rali.exe Dwm.exe PID 1304 wrote to memory of 1168 1304 rali.exe Dwm.exe PID 1304 wrote to memory of 1168 1304 rali.exe Dwm.exe PID 1304 wrote to memory of 1168 1304 rali.exe Dwm.exe PID 1304 wrote to memory of 1168 1304 rali.exe Dwm.exe PID 1304 wrote to memory of 1204 1304 rali.exe Explorer.EXE PID 1304 wrote to memory of 1204 1304 rali.exe Explorer.EXE PID 1304 wrote to memory of 1204 1304 rali.exe Explorer.EXE PID 1304 wrote to memory of 1204 1304 rali.exe Explorer.EXE PID 1304 wrote to memory of 1204 1304 rali.exe Explorer.EXE PID 1304 wrote to memory of 960 1304 rali.exe 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe PID 1304 wrote to memory of 960 1304 rali.exe 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe PID 1304 wrote to memory of 960 1304 rali.exe 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe PID 1304 wrote to memory of 960 1304 rali.exe 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe PID 1304 wrote to memory of 960 1304 rali.exe 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe PID 960 wrote to memory of 988 960 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe cmd.exe PID 960 wrote to memory of 988 960 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe cmd.exe PID 960 wrote to memory of 988 960 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe cmd.exe PID 960 wrote to memory of 988 960 79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe cmd.exe PID 1304 wrote to memory of 988 1304 rali.exe cmd.exe PID 1304 wrote to memory of 988 1304 rali.exe cmd.exe PID 1304 wrote to memory of 988 1304 rali.exe cmd.exe PID 1304 wrote to memory of 988 1304 rali.exe cmd.exe PID 1304 wrote to memory of 988 1304 rali.exe cmd.exe PID 1304 wrote to memory of 1036 1304 rali.exe conhost.exe PID 1304 wrote to memory of 1904 1304 rali.exe DllHost.exe PID 1304 wrote to memory of 1904 1304 rali.exe DllHost.exe PID 1304 wrote to memory of 1904 1304 rali.exe DllHost.exe PID 1304 wrote to memory of 1904 1304 rali.exe DllHost.exe PID 1304 wrote to memory of 1904 1304 rali.exe DllHost.exe PID 1304 wrote to memory of 1936 1304 rali.exe DllHost.exe PID 1304 wrote to memory of 1936 1304 rali.exe DllHost.exe PID 1304 wrote to memory of 1936 1304 rali.exe DllHost.exe PID 1304 wrote to memory of 1936 1304 rali.exe DllHost.exe PID 1304 wrote to memory of 1936 1304 rali.exe DllHost.exe PID 1304 wrote to memory of 1612 1304 rali.exe DllHost.exe PID 1304 wrote to memory of 1612 1304 rali.exe DllHost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe"C:\Users\Admin\AppData\Local\Temp\79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe"C:\Users\Admin\AppData\Local\Temp\79e64922b8d9b22bf1b9300ffaaeef0ebdf73dbfa4838ed12a7565481c74a88b.exe"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Roaming\Eqzonu\rali.exe"C:\Users\Admin\AppData\Roaming\Eqzonu\rali.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Roaming\Eqzonu\rali.exe"C:\Users\Admin\AppData\Roaming\Eqzonu\rali.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp344ae3a1.bat"4⤵
- Deletes itself
PID:988
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "963036315-1952412037-3894554921629167763-1538750641205860071212958986331034735349"1⤵PID:1036
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1904
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1936
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5f761b57eeec427bcacfa9b262c418ff2
SHA16d6c4be38c060059d6d1b43e05bf2ce3951234d3
SHA256022fb5d9dafe06a58d6270944493438ed8721ca4380d2d745b8f2a74f832c243
SHA5126ef85c93bf90751bd59e467dae493f14d8e1ff1801190c42730d29e38d96070f4e8d4024c00ec9b6b8e60c869f6fcfcacffa44073ade04a5e20657b5b2564de2
-
Filesize
170KB
MD52167ea33a840b73af9966c9b0791e474
SHA195b67ae0ec71ff61e5ddb54374c26662968a3ff9
SHA256e29afd2173685539fa1681e8318983eaa58ffe54efeb720580c96586621fb465
SHA512eae51dc1718f0faa604d8e9c39c815fca0edecac954d3f9dd312adfb258ca210670cbb2d07b9db9dc7526ae0b99893c7f14c2eb61dfa60b526254327b46cde7a
-
Filesize
170KB
MD52167ea33a840b73af9966c9b0791e474
SHA195b67ae0ec71ff61e5ddb54374c26662968a3ff9
SHA256e29afd2173685539fa1681e8318983eaa58ffe54efeb720580c96586621fb465
SHA512eae51dc1718f0faa604d8e9c39c815fca0edecac954d3f9dd312adfb258ca210670cbb2d07b9db9dc7526ae0b99893c7f14c2eb61dfa60b526254327b46cde7a
-
Filesize
170KB
MD52167ea33a840b73af9966c9b0791e474
SHA195b67ae0ec71ff61e5ddb54374c26662968a3ff9
SHA256e29afd2173685539fa1681e8318983eaa58ffe54efeb720580c96586621fb465
SHA512eae51dc1718f0faa604d8e9c39c815fca0edecac954d3f9dd312adfb258ca210670cbb2d07b9db9dc7526ae0b99893c7f14c2eb61dfa60b526254327b46cde7a
-
Filesize
398B
MD538be9a9d765130cbcd32de065beddb72
SHA10973d0b2a7eed154ab00cb6c6750828eecc94142
SHA256c89c98bfc6c9e9c3a182fb3b2be4daffc336cbacd244914a56ce558dacb6a5f9
SHA512fc152d72ec7574227f06dc98bcdf13e8e26efe9f4c17a62eb1a14dc0e432ace23716c8a521882d84f528228a1bc7738bf632d318e74d1c71568520c477226a89
-
Filesize
170KB
MD52167ea33a840b73af9966c9b0791e474
SHA195b67ae0ec71ff61e5ddb54374c26662968a3ff9
SHA256e29afd2173685539fa1681e8318983eaa58ffe54efeb720580c96586621fb465
SHA512eae51dc1718f0faa604d8e9c39c815fca0edecac954d3f9dd312adfb258ca210670cbb2d07b9db9dc7526ae0b99893c7f14c2eb61dfa60b526254327b46cde7a
-
Filesize
170KB
MD52167ea33a840b73af9966c9b0791e474
SHA195b67ae0ec71ff61e5ddb54374c26662968a3ff9
SHA256e29afd2173685539fa1681e8318983eaa58ffe54efeb720580c96586621fb465
SHA512eae51dc1718f0faa604d8e9c39c815fca0edecac954d3f9dd312adfb258ca210670cbb2d07b9db9dc7526ae0b99893c7f14c2eb61dfa60b526254327b46cde7a