Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:45
Static task
static1
Behavioral task
behavioral1
Sample
7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe
Resource
win10v2004-20221111-en
General
-
Target
7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe
-
Size
278KB
-
MD5
4eed0b3a6f50357026d5aea58dd59391
-
SHA1
ebd88e5f0be0033c49b6105272864469535cc459
-
SHA256
7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04
-
SHA512
76f84fe95e1e2a67e0739f609db235fa5894efb9ea06c4cf0905955b21fbee7fc612061e117323433b65bc7b268f9b0cfae316eef36eb771cf60e1ba3791c032
-
SSDEEP
6144:ZYk7R3xF3BEuTP0PvdA8r1erABpxEJPlLsiJEwpClkSm4krOLS:ZYeB0uT8Hq6erABvuPl5GRkkS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
alyr.exepid process 1952 alyr.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 520 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exepid process 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
alyr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\Currentversion\Run alyr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\{91C05068-4FEF-AD4D-7F1F-8FEC7D0BACF1} = "C:\\Users\\Admin\\AppData\\Roaming\\Wouhl\\alyr.exe" alyr.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exedescription pid process target process PID 1976 set thread context of 520 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe cmd.exe -
Processes:
7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
alyr.exepid process 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe 1952 alyr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exedescription pid process Token: SeSecurityPrivilege 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe Token: SeSecurityPrivilege 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe Token: SeSecurityPrivilege 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exealyr.exepid process 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe 1952 alyr.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exealyr.exedescription pid process target process PID 1976 wrote to memory of 1952 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe alyr.exe PID 1976 wrote to memory of 1952 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe alyr.exe PID 1976 wrote to memory of 1952 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe alyr.exe PID 1976 wrote to memory of 1952 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe alyr.exe PID 1952 wrote to memory of 1124 1952 alyr.exe taskhost.exe PID 1952 wrote to memory of 1124 1952 alyr.exe taskhost.exe PID 1952 wrote to memory of 1124 1952 alyr.exe taskhost.exe PID 1952 wrote to memory of 1124 1952 alyr.exe taskhost.exe PID 1952 wrote to memory of 1124 1952 alyr.exe taskhost.exe PID 1952 wrote to memory of 1168 1952 alyr.exe Dwm.exe PID 1952 wrote to memory of 1168 1952 alyr.exe Dwm.exe PID 1952 wrote to memory of 1168 1952 alyr.exe Dwm.exe PID 1952 wrote to memory of 1168 1952 alyr.exe Dwm.exe PID 1952 wrote to memory of 1168 1952 alyr.exe Dwm.exe PID 1952 wrote to memory of 1232 1952 alyr.exe Explorer.EXE PID 1952 wrote to memory of 1232 1952 alyr.exe Explorer.EXE PID 1952 wrote to memory of 1232 1952 alyr.exe Explorer.EXE PID 1952 wrote to memory of 1232 1952 alyr.exe Explorer.EXE PID 1952 wrote to memory of 1232 1952 alyr.exe Explorer.EXE PID 1952 wrote to memory of 1976 1952 alyr.exe 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe PID 1952 wrote to memory of 1976 1952 alyr.exe 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe PID 1952 wrote to memory of 1976 1952 alyr.exe 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe PID 1952 wrote to memory of 1976 1952 alyr.exe 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe PID 1952 wrote to memory of 1976 1952 alyr.exe 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe PID 1976 wrote to memory of 520 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe cmd.exe PID 1976 wrote to memory of 520 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe cmd.exe PID 1976 wrote to memory of 520 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe cmd.exe PID 1976 wrote to memory of 520 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe cmd.exe PID 1976 wrote to memory of 520 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe cmd.exe PID 1976 wrote to memory of 520 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe cmd.exe PID 1976 wrote to memory of 520 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe cmd.exe PID 1976 wrote to memory of 520 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe cmd.exe PID 1976 wrote to memory of 520 1976 7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe cmd.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe"C:\Users\Admin\AppData\Local\Temp\7b76c17c1e6a9fabe541335c809bf31c9b9c657c07691a2104ecd53e8a413f04.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\Wouhl\alyr.exe"C:\Users\Admin\AppData\Roaming\Wouhl\alyr.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp08ce6a1a.bat"3⤵
- Deletes itself
PID:520
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5e53c36e99074f8b197230078992b539a
SHA1d6d179a5485f82070db1d06e07bd8b90787a64d2
SHA256c011385526ad9f98b7701cc405e364a92b3fb6d9bf4c43d27bb479b9d9112075
SHA51214d0ba75c471a806a24fa2c46cf8bc8370c3d83bfd4778903f4ae980920774ea705ee21cba3c8ad3143bc7c07b2c047e7147a7c082e71f6e5fb0a15cbf8a161e
-
Filesize
278KB
MD563866df24f1a986468ec0854c37415de
SHA1e5c54b0998f65544c4ce6cccd2d61ae4d0464bb1
SHA2565a962169d14b800f8adb5be2478a1bed4d17dfe6a9b33c8e1daa424a5f5bf25e
SHA512d984c7fc4f3b2dc3cab94d3b7a3e2d69cbf0768c97db71f0c38d37cc215d1bafd9efba3ad6f21f71ea069c92862e560c904b6394b57de17606c81b405263d376
-
Filesize
278KB
MD563866df24f1a986468ec0854c37415de
SHA1e5c54b0998f65544c4ce6cccd2d61ae4d0464bb1
SHA2565a962169d14b800f8adb5be2478a1bed4d17dfe6a9b33c8e1daa424a5f5bf25e
SHA512d984c7fc4f3b2dc3cab94d3b7a3e2d69cbf0768c97db71f0c38d37cc215d1bafd9efba3ad6f21f71ea069c92862e560c904b6394b57de17606c81b405263d376
-
Filesize
398B
MD5d8aab75e91759416a2daf93bd8b4d438
SHA1530591df9cf07135efc852fdcefe6d52b3bc241b
SHA25642dcd999e5b535655b757e2b5fab3b4f24b6c50787f00cf8e95d1b41de8f5b57
SHA5128e10be3d92ce50aa96678a006fbb774708439b0054670cc2249f6c2e656a507a16f244f559e1c39a2b96c55c0f9c214d0048668347a09b3e3c187d63c74e4b98
-
Filesize
278KB
MD563866df24f1a986468ec0854c37415de
SHA1e5c54b0998f65544c4ce6cccd2d61ae4d0464bb1
SHA2565a962169d14b800f8adb5be2478a1bed4d17dfe6a9b33c8e1daa424a5f5bf25e
SHA512d984c7fc4f3b2dc3cab94d3b7a3e2d69cbf0768c97db71f0c38d37cc215d1bafd9efba3ad6f21f71ea069c92862e560c904b6394b57de17606c81b405263d376
-
Filesize
278KB
MD563866df24f1a986468ec0854c37415de
SHA1e5c54b0998f65544c4ce6cccd2d61ae4d0464bb1
SHA2565a962169d14b800f8adb5be2478a1bed4d17dfe6a9b33c8e1daa424a5f5bf25e
SHA512d984c7fc4f3b2dc3cab94d3b7a3e2d69cbf0768c97db71f0c38d37cc215d1bafd9efba3ad6f21f71ea069c92862e560c904b6394b57de17606c81b405263d376