Analysis
-
max time kernel
158s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:44
Static task
static1
Behavioral task
behavioral1
Sample
0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe
Resource
win10v2004-20221111-en
General
-
Target
0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe
-
Size
138KB
-
MD5
6d8819c8210134eb975c152c08279a72
-
SHA1
4f44d19399ddfb84ff1fdbd8f1881ab77d65cf2b
-
SHA256
0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0
-
SHA512
1737e0d3076192d94cc8ebfb0babac39f027a73f4c72e40d669cbaf71b2cf645c09c40da413913c294d239dae20e66d915ce95f3e5cb3fbc96e5acca6102c9dd
-
SSDEEP
3072:KTSx50VJqtHGbu5XCniylWrtGA1GHvGXaCH1Fukp1b3wQGl:KTSoGtmiYlW4A1QvGXjBkQGl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
loafq.exepid process 1412 loafq.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 840 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exepid process 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
loafq.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run loafq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{EDE94C82-C746-F1C9-96B2-C3D51FF873D9} = "C:\\Users\\Admin\\AppData\\Roaming\\Qyrul\\loafq.exe" loafq.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exedescription pid process target process PID 1356 set thread context of 840 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe cmd.exe -
Processes:
0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\3E8A765B-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
loafq.exepid process 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe 1412 loafq.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.execmd.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe Token: SeSecurityPrivilege 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe Token: SeSecurityPrivilege 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe Token: SeSecurityPrivilege 840 cmd.exe Token: SeManageVolumePrivilege 1280 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WinMail.exepid process 1280 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WinMail.exepid process 1280 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 1280 WinMail.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exeloafq.exedescription pid process target process PID 1356 wrote to memory of 1412 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe loafq.exe PID 1356 wrote to memory of 1412 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe loafq.exe PID 1356 wrote to memory of 1412 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe loafq.exe PID 1356 wrote to memory of 1412 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe loafq.exe PID 1412 wrote to memory of 1148 1412 loafq.exe taskhost.exe PID 1412 wrote to memory of 1148 1412 loafq.exe taskhost.exe PID 1412 wrote to memory of 1148 1412 loafq.exe taskhost.exe PID 1412 wrote to memory of 1148 1412 loafq.exe taskhost.exe PID 1412 wrote to memory of 1148 1412 loafq.exe taskhost.exe PID 1412 wrote to memory of 1236 1412 loafq.exe Dwm.exe PID 1412 wrote to memory of 1236 1412 loafq.exe Dwm.exe PID 1412 wrote to memory of 1236 1412 loafq.exe Dwm.exe PID 1412 wrote to memory of 1236 1412 loafq.exe Dwm.exe PID 1412 wrote to memory of 1236 1412 loafq.exe Dwm.exe PID 1412 wrote to memory of 1272 1412 loafq.exe Explorer.EXE PID 1412 wrote to memory of 1272 1412 loafq.exe Explorer.EXE PID 1412 wrote to memory of 1272 1412 loafq.exe Explorer.EXE PID 1412 wrote to memory of 1272 1412 loafq.exe Explorer.EXE PID 1412 wrote to memory of 1272 1412 loafq.exe Explorer.EXE PID 1412 wrote to memory of 1356 1412 loafq.exe 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe PID 1412 wrote to memory of 1356 1412 loafq.exe 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe PID 1412 wrote to memory of 1356 1412 loafq.exe 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe PID 1412 wrote to memory of 1356 1412 loafq.exe 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe PID 1412 wrote to memory of 1356 1412 loafq.exe 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe PID 1356 wrote to memory of 840 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe cmd.exe PID 1356 wrote to memory of 840 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe cmd.exe PID 1356 wrote to memory of 840 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe cmd.exe PID 1356 wrote to memory of 840 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe cmd.exe PID 1356 wrote to memory of 840 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe cmd.exe PID 1356 wrote to memory of 840 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe cmd.exe PID 1356 wrote to memory of 840 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe cmd.exe PID 1356 wrote to memory of 840 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe cmd.exe PID 1356 wrote to memory of 840 1356 0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe cmd.exe PID 1412 wrote to memory of 1684 1412 loafq.exe conhost.exe PID 1412 wrote to memory of 1684 1412 loafq.exe conhost.exe PID 1412 wrote to memory of 1684 1412 loafq.exe conhost.exe PID 1412 wrote to memory of 1684 1412 loafq.exe conhost.exe PID 1412 wrote to memory of 1684 1412 loafq.exe conhost.exe PID 1412 wrote to memory of 1280 1412 loafq.exe WinMail.exe PID 1412 wrote to memory of 1280 1412 loafq.exe WinMail.exe PID 1412 wrote to memory of 1280 1412 loafq.exe WinMail.exe PID 1412 wrote to memory of 1280 1412 loafq.exe WinMail.exe PID 1412 wrote to memory of 1280 1412 loafq.exe WinMail.exe PID 1412 wrote to memory of 1200 1412 loafq.exe DllHost.exe PID 1412 wrote to memory of 1200 1412 loafq.exe DllHost.exe PID 1412 wrote to memory of 1200 1412 loafq.exe DllHost.exe PID 1412 wrote to memory of 1200 1412 loafq.exe DllHost.exe PID 1412 wrote to memory of 1200 1412 loafq.exe DllHost.exe PID 1412 wrote to memory of 1388 1412 loafq.exe DllHost.exe PID 1412 wrote to memory of 1388 1412 loafq.exe DllHost.exe PID 1412 wrote to memory of 1388 1412 loafq.exe DllHost.exe PID 1412 wrote to memory of 1388 1412 loafq.exe DllHost.exe PID 1412 wrote to memory of 1388 1412 loafq.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1148
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe"C:\Users\Admin\AppData\Local\Temp\0fb2acc83d60301102cda6e78db8cd4546e774bac836bf87c633c3fd1a86b1e0.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Roaming\Qyrul\loafq.exe"C:\Users\Admin\AppData\Roaming\Qyrul\loafq.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpb7b18f31.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:840
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1236
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1321468786-305325399-1247776549-1709128616-37231726905878190-334584036-1070824153"1⤵PID:1684
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1280
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1200
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1388
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD59f6b34714a614645a72b11d581db0725
SHA1a21485c437b1b244dd543d9abeee7f86c84093c3
SHA256c4aefd7bcfb36491e0c1eabb080d3fb39d632df98f1747c3eeaf5d5c765e9301
SHA51229df5eb0c8d8194803774bb27e60ad509bf9b08a9665035610c6a289b1428439348d384cf1e079c2d0c369c059b9179cfbd081a42c55856b5ab0879a43bcedc0
-
Filesize
398B
MD568223d3e82f956293c362b7b5a21a87f
SHA1094d469eddf15d62399e87fa5335fa5979a9fdb1
SHA2562d6658da29479dc21f8cc7b4ca1f1d2706ccc7ae219e3f5b59dfdfb432b3bb23
SHA512019af572c0bd828adcc15b4df347bf2643f09b53358630e595247788a5321399ce852b8aa3143cd77c363aa1c167c87360b7c17494ef3a54c8df7acda85dbc83
-
Filesize
138KB
MD58a5ca5926331d6edc8603a3927a9ec72
SHA17f5fa9708200b9405a1a3c62ae41722940e01bb9
SHA256af773dad442b162d9c8731f0259a65dee1870e8bfc5953a8ef0627b55cadd11e
SHA512700c09ac172ab5dbe23cef3899bcd91b56de94fde8a4f0e9139f9651c0a90828199213f2465618a0105e03a5f0a562b2da9d518e37cc30fd6711574dcd6fc9b4
-
Filesize
138KB
MD58a5ca5926331d6edc8603a3927a9ec72
SHA17f5fa9708200b9405a1a3c62ae41722940e01bb9
SHA256af773dad442b162d9c8731f0259a65dee1870e8bfc5953a8ef0627b55cadd11e
SHA512700c09ac172ab5dbe23cef3899bcd91b56de94fde8a4f0e9139f9651c0a90828199213f2465618a0105e03a5f0a562b2da9d518e37cc30fd6711574dcd6fc9b4
-
Filesize
138KB
MD58a5ca5926331d6edc8603a3927a9ec72
SHA17f5fa9708200b9405a1a3c62ae41722940e01bb9
SHA256af773dad442b162d9c8731f0259a65dee1870e8bfc5953a8ef0627b55cadd11e
SHA512700c09ac172ab5dbe23cef3899bcd91b56de94fde8a4f0e9139f9651c0a90828199213f2465618a0105e03a5f0a562b2da9d518e37cc30fd6711574dcd6fc9b4
-
Filesize
138KB
MD58a5ca5926331d6edc8603a3927a9ec72
SHA17f5fa9708200b9405a1a3c62ae41722940e01bb9
SHA256af773dad442b162d9c8731f0259a65dee1870e8bfc5953a8ef0627b55cadd11e
SHA512700c09ac172ab5dbe23cef3899bcd91b56de94fde8a4f0e9139f9651c0a90828199213f2465618a0105e03a5f0a562b2da9d518e37cc30fd6711574dcd6fc9b4