Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:43
Static task
static1
Behavioral task
behavioral1
Sample
fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe
Resource
win10v2004-20221111-en
General
-
Target
fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe
-
Size
351KB
-
MD5
91458c7086ecdae7abbee181188e7ff7
-
SHA1
e64f8cb987608820db4ee6fbd098fd14034afc61
-
SHA256
fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d
-
SHA512
aff041910a6e7cf1ca5011c770eda1790672eef7e36eb2412044b37751786d3a707ab2ca11ccc2adf6dc36244d61364610159530f189512a5d282e96818fdea5
-
SSDEEP
6144:Qajim2UMkGolvCnITy0LBBL0NKrGWBGk9uhzRs1VQMpLEGBL3cxZo:Qamm2SGolvCFUBLnrGWBZc9qQ5GBbczo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
vygi.exepid process 1120 vygi.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1964 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exepid process 1448 fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\{E8090743-545D-BCC9-67C5-EE9E71C1B2C4} = "\"C:\\Users\\Admin\\AppData\\Roaming\\Ynihs\\vygi.exe\"" explorer.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7AD269E3-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
vygi.exeexplorer.exepid process 1120 vygi.exe 1120 vygi.exe 1100 explorer.exe 1100 explorer.exe 1100 explorer.exe 1100 explorer.exe 1100 explorer.exe 1100 explorer.exe 1100 explorer.exe 1100 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
vygi.exepid process 1120 vygi.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 1448 fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe Token: SeManageVolumePrivilege 472 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WinMail.exepid process 472 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WinMail.exepid process 472 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 472 WinMail.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exevygi.exeexplorer.exedescription pid process target process PID 1448 wrote to memory of 1120 1448 fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe vygi.exe PID 1448 wrote to memory of 1120 1448 fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe vygi.exe PID 1448 wrote to memory of 1120 1448 fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe vygi.exe PID 1448 wrote to memory of 1120 1448 fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe vygi.exe PID 1120 wrote to memory of 1100 1120 vygi.exe explorer.exe PID 1120 wrote to memory of 1100 1120 vygi.exe explorer.exe PID 1120 wrote to memory of 1100 1120 vygi.exe explorer.exe PID 1120 wrote to memory of 1100 1120 vygi.exe explorer.exe PID 1100 wrote to memory of 1392 1100 explorer.exe Explorer.EXE PID 1100 wrote to memory of 1392 1100 explorer.exe Explorer.EXE PID 1100 wrote to memory of 1392 1100 explorer.exe Explorer.EXE PID 1448 wrote to memory of 1964 1448 fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe cmd.exe PID 1448 wrote to memory of 1964 1448 fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe cmd.exe PID 1448 wrote to memory of 1964 1448 fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe cmd.exe PID 1448 wrote to memory of 1964 1448 fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe"C:\Users\Admin\AppData\Local\Temp\fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Roaming\Ynihs\vygi.exe"C:\Users\Admin\AppData\Roaming\Ynihs\vygi.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpabaa0bd9.bat"3⤵
- Deletes itself
PID:1964
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD51a7e7caf945ba8f0229087445523a278
SHA1c3e3faa74ae234ec77065a90fa98e0ae42d3401b
SHA256c7df7722818f8868e4f00fcc6ed19f77910cf855f76bb5973df10bc678bbad3b
SHA512a85d407c452808096b18f493813d0f4a1966c870a715ebcc2ee69a0aec717212b63b3d1d980e49a6421498f49966a15e4f7af3afb0acddf073666b77dbb1576e
-
Filesize
351KB
MD56e444d7801e687633c96ad4594b1056d
SHA1c313776dde75bab4ae90ab3b4d762bea9819d9ed
SHA256943861a48a8f7b8dc8f4b71b53f6ad4997cf06adfe2286ab24b3aadfe9597a74
SHA512413f6f9b262a4d61a35c67943a1270f11b946ff37d6ad203b01841851805bb2e65e3865f75e93107c54222535de4bf454ffc6c7b52c4a26ce7f3b7385a558b2d
-
Filesize
351KB
MD56e444d7801e687633c96ad4594b1056d
SHA1c313776dde75bab4ae90ab3b4d762bea9819d9ed
SHA256943861a48a8f7b8dc8f4b71b53f6ad4997cf06adfe2286ab24b3aadfe9597a74
SHA512413f6f9b262a4d61a35c67943a1270f11b946ff37d6ad203b01841851805bb2e65e3865f75e93107c54222535de4bf454ffc6c7b52c4a26ce7f3b7385a558b2d
-
Filesize
351KB
MD56e444d7801e687633c96ad4594b1056d
SHA1c313776dde75bab4ae90ab3b4d762bea9819d9ed
SHA256943861a48a8f7b8dc8f4b71b53f6ad4997cf06adfe2286ab24b3aadfe9597a74
SHA512413f6f9b262a4d61a35c67943a1270f11b946ff37d6ad203b01841851805bb2e65e3865f75e93107c54222535de4bf454ffc6c7b52c4a26ce7f3b7385a558b2d