Analysis
-
max time kernel
105s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:45
Static task
static1
Behavioral task
behavioral1
Sample
60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe
Resource
win10v2004-20221111-en
General
-
Target
60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe
-
Size
330KB
-
MD5
05789d739348e1676df6c702061d942b
-
SHA1
551efdb39a0fbcf7ec9f70b3ad935028dfd84bbd
-
SHA256
60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0
-
SHA512
534389b9684b0059f3c960d8fa25dd6830fa634f3d776158c961789c0bbf19a5e8c3c9bcb3bdc68d5631b15e6e70c164ee47af4f06886c97e79c3df66bf47179
-
SSDEEP
6144:vtEQ7FUgTiyUXe2ZsD9eBVtQRlc12iVkIFzW9TLSDoC3FHvKHM9lnH:vayFBiym920jcc1f9a9XS335vH9l
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
byde.exepid process 1792 byde.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 672 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exepid process 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
byde.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\Currentversion\Run byde.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\{0F2E54C8-3777-AD4D-74EB-E9074BCFCA1A} = "C:\\Users\\Admin\\AppData\\Roaming\\Ysjesu\\byde.exe" byde.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exedescription pid process target process PID 788 set thread context of 672 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe cmd.exe -
Processes:
60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Privacy 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
byde.exepid process 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe 1792 byde.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exebyde.exepid process 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe 1792 byde.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exebyde.exedescription pid process target process PID 788 wrote to memory of 1792 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe byde.exe PID 788 wrote to memory of 1792 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe byde.exe PID 788 wrote to memory of 1792 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe byde.exe PID 788 wrote to memory of 1792 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe byde.exe PID 1792 wrote to memory of 1112 1792 byde.exe taskhost.exe PID 1792 wrote to memory of 1112 1792 byde.exe taskhost.exe PID 1792 wrote to memory of 1112 1792 byde.exe taskhost.exe PID 1792 wrote to memory of 1112 1792 byde.exe taskhost.exe PID 1792 wrote to memory of 1112 1792 byde.exe taskhost.exe PID 1792 wrote to memory of 1180 1792 byde.exe Dwm.exe PID 1792 wrote to memory of 1180 1792 byde.exe Dwm.exe PID 1792 wrote to memory of 1180 1792 byde.exe Dwm.exe PID 1792 wrote to memory of 1180 1792 byde.exe Dwm.exe PID 1792 wrote to memory of 1180 1792 byde.exe Dwm.exe PID 1792 wrote to memory of 1220 1792 byde.exe Explorer.EXE PID 1792 wrote to memory of 1220 1792 byde.exe Explorer.EXE PID 1792 wrote to memory of 1220 1792 byde.exe Explorer.EXE PID 1792 wrote to memory of 1220 1792 byde.exe Explorer.EXE PID 1792 wrote to memory of 1220 1792 byde.exe Explorer.EXE PID 1792 wrote to memory of 788 1792 byde.exe 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe PID 1792 wrote to memory of 788 1792 byde.exe 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe PID 1792 wrote to memory of 788 1792 byde.exe 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe PID 1792 wrote to memory of 788 1792 byde.exe 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe PID 1792 wrote to memory of 788 1792 byde.exe 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe PID 788 wrote to memory of 672 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe cmd.exe PID 788 wrote to memory of 672 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe cmd.exe PID 788 wrote to memory of 672 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe cmd.exe PID 788 wrote to memory of 672 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe cmd.exe PID 788 wrote to memory of 672 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe cmd.exe PID 788 wrote to memory of 672 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe cmd.exe PID 788 wrote to memory of 672 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe cmd.exe PID 788 wrote to memory of 672 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe cmd.exe PID 788 wrote to memory of 672 788 60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe cmd.exe PID 1792 wrote to memory of 920 1792 byde.exe DllHost.exe PID 1792 wrote to memory of 920 1792 byde.exe DllHost.exe PID 1792 wrote to memory of 920 1792 byde.exe DllHost.exe PID 1792 wrote to memory of 920 1792 byde.exe DllHost.exe PID 1792 wrote to memory of 920 1792 byde.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe"C:\Users\Admin\AppData\Local\Temp\60bf4a37b8b8688b8093b969232ffb34a3918f1dc83e73b3cbed8ef5da03c4d0.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Roaming\Ysjesu\byde.exe"C:\Users\Admin\AppData\Roaming\Ysjesu\byde.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpff6b4f8c.bat"2⤵
- Deletes itself
PID:672
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD50edebf7a9ed6607b06d424b17169d135
SHA158938696bd43299ecc67386be71f4607edfff84c
SHA256df17ab4de4df63a70c88f790b0b48108f0441cbf61f6db1aef740428b09784d7
SHA51246a2b2be3c9ed193becae216c5734a1cd515571486ae9cb49b2ebbd56a54c88bffbc445b5dc9f7c8cc7d3642ba1efaea4cf3e3e4eafb8d8f01fe829cd16a9eee
-
Filesize
330KB
MD5c6f9da7ba800434fe84418cf4716a932
SHA17cf9ddaa4733cde8b23b1856ff8030b9777764d4
SHA25690dd2df8d8d8d35df9d59e8aef9016ea5a4aa20d1aa49e5efb36b522484db72b
SHA5127aae1659fa56d877cb8b2b7759721b2fbec56099d42757ebf5cedf5bd53df182841d64e830f8fc63e2823ff4233d9a04f6356abfa651f059e5147e7b21115a13
-
Filesize
330KB
MD5c6f9da7ba800434fe84418cf4716a932
SHA17cf9ddaa4733cde8b23b1856ff8030b9777764d4
SHA25690dd2df8d8d8d35df9d59e8aef9016ea5a4aa20d1aa49e5efb36b522484db72b
SHA5127aae1659fa56d877cb8b2b7759721b2fbec56099d42757ebf5cedf5bd53df182841d64e830f8fc63e2823ff4233d9a04f6356abfa651f059e5147e7b21115a13
-
Filesize
330KB
MD5c6f9da7ba800434fe84418cf4716a932
SHA17cf9ddaa4733cde8b23b1856ff8030b9777764d4
SHA25690dd2df8d8d8d35df9d59e8aef9016ea5a4aa20d1aa49e5efb36b522484db72b
SHA5127aae1659fa56d877cb8b2b7759721b2fbec56099d42757ebf5cedf5bd53df182841d64e830f8fc63e2823ff4233d9a04f6356abfa651f059e5147e7b21115a13
-
Filesize
330KB
MD5c6f9da7ba800434fe84418cf4716a932
SHA17cf9ddaa4733cde8b23b1856ff8030b9777764d4
SHA25690dd2df8d8d8d35df9d59e8aef9016ea5a4aa20d1aa49e5efb36b522484db72b
SHA5127aae1659fa56d877cb8b2b7759721b2fbec56099d42757ebf5cedf5bd53df182841d64e830f8fc63e2823ff4233d9a04f6356abfa651f059e5147e7b21115a13