Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:44
Static task
static1
Behavioral task
behavioral1
Sample
d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe
Resource
win10v2004-20220812-en
General
-
Target
d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe
-
Size
306KB
-
MD5
f3ebfa7620168235291806a159b573ff
-
SHA1
3dcd61c8efe9a1e4b9eba69da5e288c3103cfb51
-
SHA256
d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a
-
SHA512
8f191287944d1afd1148a9039068601a5111b4182ef1379b83139c7617a19a3943b7c924d0a5db63d5caab72c2e0cda8f396c7f686dc83ddd86c128bb2e7dcef
-
SSDEEP
6144:esAAud4378+l4A4qxy/3wyhu1r4/G3MbCr5X79e/cPszxSg:esAIr7SA48UnFOcS5Xac
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ohivtu.exepid process 1548 ohivtu.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1952 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exepid process 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ohivtu.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run ohivtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ohivtu = "C:\\Users\\Admin\\AppData\\Roaming\\Bajyqu\\ohivtu.exe" ohivtu.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exedescription pid process target process PID 1552 set thread context of 1952 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
ohivtu.exepid process 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe 1548 ohivtu.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exeohivtu.exedescription pid process target process PID 1552 wrote to memory of 1548 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe ohivtu.exe PID 1552 wrote to memory of 1548 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe ohivtu.exe PID 1552 wrote to memory of 1548 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe ohivtu.exe PID 1552 wrote to memory of 1548 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe ohivtu.exe PID 1548 wrote to memory of 1132 1548 ohivtu.exe taskhost.exe PID 1548 wrote to memory of 1132 1548 ohivtu.exe taskhost.exe PID 1548 wrote to memory of 1132 1548 ohivtu.exe taskhost.exe PID 1548 wrote to memory of 1132 1548 ohivtu.exe taskhost.exe PID 1548 wrote to memory of 1132 1548 ohivtu.exe taskhost.exe PID 1548 wrote to memory of 1188 1548 ohivtu.exe Dwm.exe PID 1548 wrote to memory of 1188 1548 ohivtu.exe Dwm.exe PID 1548 wrote to memory of 1188 1548 ohivtu.exe Dwm.exe PID 1548 wrote to memory of 1188 1548 ohivtu.exe Dwm.exe PID 1548 wrote to memory of 1188 1548 ohivtu.exe Dwm.exe PID 1548 wrote to memory of 1220 1548 ohivtu.exe Explorer.EXE PID 1548 wrote to memory of 1220 1548 ohivtu.exe Explorer.EXE PID 1548 wrote to memory of 1220 1548 ohivtu.exe Explorer.EXE PID 1548 wrote to memory of 1220 1548 ohivtu.exe Explorer.EXE PID 1548 wrote to memory of 1220 1548 ohivtu.exe Explorer.EXE PID 1548 wrote to memory of 1552 1548 ohivtu.exe d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe PID 1548 wrote to memory of 1552 1548 ohivtu.exe d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe PID 1548 wrote to memory of 1552 1548 ohivtu.exe d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe PID 1548 wrote to memory of 1552 1548 ohivtu.exe d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe PID 1548 wrote to memory of 1552 1548 ohivtu.exe d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe PID 1552 wrote to memory of 1952 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe cmd.exe PID 1552 wrote to memory of 1952 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe cmd.exe PID 1552 wrote to memory of 1952 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe cmd.exe PID 1552 wrote to memory of 1952 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe cmd.exe PID 1552 wrote to memory of 1952 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe cmd.exe PID 1552 wrote to memory of 1952 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe cmd.exe PID 1552 wrote to memory of 1952 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe cmd.exe PID 1552 wrote to memory of 1952 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe cmd.exe PID 1552 wrote to memory of 1952 1552 d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe cmd.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe"C:\Users\Admin\AppData\Local\Temp\d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Roaming\Bajyqu\ohivtu.exe"C:\Users\Admin\AppData\Roaming\Bajyqu\ohivtu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\JOLE149.bat"3⤵
- Deletes itself
PID:1952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD5a3c4118897eb7aca8d4caf9b2ff54cdc
SHA13ca3a99c30f94c610a797d0423dc3c2ab083aae7
SHA25618948216818d7b7b13fde4d0cb261b26f1b60095ce633c80c3b9368cc74d51de
SHA512cbdfd2196c819928a94ef86b7921d455fe4808efee524abc1d335fa2b7fafb976686c80f729d91119f790b7ba639576373e53bcdcdc48fa507fabb1fa80daf1b
-
Filesize
306KB
MD5c578d37a2304cf33bba2c8d38e27214b
SHA1f61e57b55a74bf71215f4290f750cc94f7564870
SHA2561e2a7d01b537f080ab0880125adbc86dfa1bf403390a88a31e66b6df0ff80f57
SHA5120257a15e0b39145936c3ae4337e69bb059f77657ff1e4b400659fa1ddb9ecb051320cc7df20673d995e1d5f02c2fda071dd5b2958b494e503eeadec5a3ad472a
-
Filesize
306KB
MD5c578d37a2304cf33bba2c8d38e27214b
SHA1f61e57b55a74bf71215f4290f750cc94f7564870
SHA2561e2a7d01b537f080ab0880125adbc86dfa1bf403390a88a31e66b6df0ff80f57
SHA5120257a15e0b39145936c3ae4337e69bb059f77657ff1e4b400659fa1ddb9ecb051320cc7df20673d995e1d5f02c2fda071dd5b2958b494e503eeadec5a3ad472a
-
Filesize
306KB
MD5c578d37a2304cf33bba2c8d38e27214b
SHA1f61e57b55a74bf71215f4290f750cc94f7564870
SHA2561e2a7d01b537f080ab0880125adbc86dfa1bf403390a88a31e66b6df0ff80f57
SHA5120257a15e0b39145936c3ae4337e69bb059f77657ff1e4b400659fa1ddb9ecb051320cc7df20673d995e1d5f02c2fda071dd5b2958b494e503eeadec5a3ad472a
-
Filesize
306KB
MD5c578d37a2304cf33bba2c8d38e27214b
SHA1f61e57b55a74bf71215f4290f750cc94f7564870
SHA2561e2a7d01b537f080ab0880125adbc86dfa1bf403390a88a31e66b6df0ff80f57
SHA5120257a15e0b39145936c3ae4337e69bb059f77657ff1e4b400659fa1ddb9ecb051320cc7df20673d995e1d5f02c2fda071dd5b2958b494e503eeadec5a3ad472a