Analysis
-
max time kernel
150s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:45
Static task
static1
Behavioral task
behavioral1
Sample
39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe
Resource
win10v2004-20221111-en
General
-
Target
39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe
-
Size
357KB
-
MD5
2f802d2af925bf481342e2930a0a1bbc
-
SHA1
357dce5f3fed2d67ab6eb51a3c971f6cf5397d89
-
SHA256
39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1
-
SHA512
64786ee942f491bff598b252e67df93ffff8a4cec87ab89e0d70de4533fe4519410e15826369ebf682f8ec837ffebd18547120bc7af45f1a1efd8298d9fd6aa2
-
SSDEEP
6144:C4//qpBmFHs3czyOxW8RjSqjAvzxCaQHkRw0ZjOEd4xEtpzbpk:C46pBiHs3czfxW8B7jAv1CaXuIGGb2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ewal.exepid process 1320 ewal.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 308 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exepid process 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ewal.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run ewal.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7BD94DA8-4FEF-AD4D-5225-887A4931AB67} = "C:\\Users\\Admin\\AppData\\Roaming\\Kieg\\ewal.exe" ewal.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exedescription pid process target process PID 1832 set thread context of 308 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe cmd.exe -
Processes:
39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
ewal.exepid process 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe 1320 ewal.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exeewal.exepid process 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe 1320 ewal.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exeewal.exedescription pid process target process PID 1832 wrote to memory of 1320 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe ewal.exe PID 1832 wrote to memory of 1320 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe ewal.exe PID 1832 wrote to memory of 1320 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe ewal.exe PID 1832 wrote to memory of 1320 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe ewal.exe PID 1320 wrote to memory of 1116 1320 ewal.exe taskhost.exe PID 1320 wrote to memory of 1116 1320 ewal.exe taskhost.exe PID 1320 wrote to memory of 1116 1320 ewal.exe taskhost.exe PID 1320 wrote to memory of 1116 1320 ewal.exe taskhost.exe PID 1320 wrote to memory of 1116 1320 ewal.exe taskhost.exe PID 1320 wrote to memory of 1188 1320 ewal.exe Dwm.exe PID 1320 wrote to memory of 1188 1320 ewal.exe Dwm.exe PID 1320 wrote to memory of 1188 1320 ewal.exe Dwm.exe PID 1320 wrote to memory of 1188 1320 ewal.exe Dwm.exe PID 1320 wrote to memory of 1188 1320 ewal.exe Dwm.exe PID 1320 wrote to memory of 1216 1320 ewal.exe Explorer.EXE PID 1320 wrote to memory of 1216 1320 ewal.exe Explorer.EXE PID 1320 wrote to memory of 1216 1320 ewal.exe Explorer.EXE PID 1320 wrote to memory of 1216 1320 ewal.exe Explorer.EXE PID 1320 wrote to memory of 1216 1320 ewal.exe Explorer.EXE PID 1320 wrote to memory of 1832 1320 ewal.exe 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe PID 1320 wrote to memory of 1832 1320 ewal.exe 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe PID 1320 wrote to memory of 1832 1320 ewal.exe 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe PID 1320 wrote to memory of 1832 1320 ewal.exe 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe PID 1320 wrote to memory of 1832 1320 ewal.exe 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe PID 1832 wrote to memory of 308 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe cmd.exe PID 1832 wrote to memory of 308 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe cmd.exe PID 1832 wrote to memory of 308 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe cmd.exe PID 1832 wrote to memory of 308 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe cmd.exe PID 1832 wrote to memory of 308 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe cmd.exe PID 1832 wrote to memory of 308 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe cmd.exe PID 1832 wrote to memory of 308 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe cmd.exe PID 1832 wrote to memory of 308 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe cmd.exe PID 1832 wrote to memory of 308 1832 39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe"C:\Users\Admin\AppData\Local\Temp\39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Roaming\Kieg\ewal.exe"C:\Users\Admin\AppData\Roaming\Kieg\ewal.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa7d51ad6.bat"3⤵
- Deletes itself
PID:308
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD52d6087d31e84aea8fe87dbbcb5219856
SHA1c64e391c7ff984356a4b23275aefee9391c0b66a
SHA2562b1ae0e7cf0fa906725e8531373dfbbd4a5f1ca5e97f8c944fec83fcc100c976
SHA512c6b2330646d0a2ebfebe1e73d979083c3f0fb8bc74a1a71307eea4a0fed1824d3bf7c5f3bb285f5a559d83c470d6c43e0c9e87fb9422b2b7741e8a2795f018f7
-
Filesize
357KB
MD5bb4108bd9bb779e4376a1e797c97d692
SHA19b7dde23a27fda0e2dc4db9c3461f51dd99be6e9
SHA2567978d6cff34caca0f8a005f249261e24c8702148bde1076f7d10d261e50df452
SHA51276e06c3364295b0005b17e4b58ae34f831479cb5bdcc41e8ecb1f92612d2853a83e27278a1556e89f996a9724a498dbce423e12ba9c5ec2230bf42514725eb35
-
Filesize
357KB
MD5bb4108bd9bb779e4376a1e797c97d692
SHA19b7dde23a27fda0e2dc4db9c3461f51dd99be6e9
SHA2567978d6cff34caca0f8a005f249261e24c8702148bde1076f7d10d261e50df452
SHA51276e06c3364295b0005b17e4b58ae34f831479cb5bdcc41e8ecb1f92612d2853a83e27278a1556e89f996a9724a498dbce423e12ba9c5ec2230bf42514725eb35
-
Filesize
357KB
MD5bb4108bd9bb779e4376a1e797c97d692
SHA19b7dde23a27fda0e2dc4db9c3461f51dd99be6e9
SHA2567978d6cff34caca0f8a005f249261e24c8702148bde1076f7d10d261e50df452
SHA51276e06c3364295b0005b17e4b58ae34f831479cb5bdcc41e8ecb1f92612d2853a83e27278a1556e89f996a9724a498dbce423e12ba9c5ec2230bf42514725eb35
-
Filesize
357KB
MD5bb4108bd9bb779e4376a1e797c97d692
SHA19b7dde23a27fda0e2dc4db9c3461f51dd99be6e9
SHA2567978d6cff34caca0f8a005f249261e24c8702148bde1076f7d10d261e50df452
SHA51276e06c3364295b0005b17e4b58ae34f831479cb5bdcc41e8ecb1f92612d2853a83e27278a1556e89f996a9724a498dbce423e12ba9c5ec2230bf42514725eb35