Analysis
-
max time kernel
183s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:45
Static task
static1
Behavioral task
behavioral1
Sample
8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe
Resource
win10v2004-20220812-en
General
-
Target
8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe
-
Size
138KB
-
MD5
9b09ed30a99f63b39ec9708e42ba0480
-
SHA1
26237c48e83bb99d7406a6e6c15e72b94575a2e7
-
SHA256
8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f
-
SHA512
696655909c45e57f1aa6897bb028415fc16eb22b38153398e5009be9e6e49778abb76fb100b24b0a999fb69ac21f7c637913e4faaa7a583021bd74647558b1f5
-
SSDEEP
3072:qzr1LZQEduEgsW2UPqxUEXqkC0i50/YXiQXT+t/8XIgfUTaXD3kz1QNI:qzr1L+QHhUPqxUEVQiQwkXhfUThQi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
zoyv.exepid process 300 zoyv.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1364 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exepid process 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
zoyv.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\Currentversion\Run zoyv.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\{381B0BFE-D51D-989F-4657-F339EAC47B68} = "C:\\Users\\Admin\\AppData\\Roaming\\Zozeem\\zoyv.exe" zoyv.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exedescription pid process target process PID 1044 set thread context of 1364 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe cmd.exe -
Processes:
8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Privacy 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\381768C4-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
zoyv.exepid process 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe 300 zoyv.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.execmd.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe Token: SeSecurityPrivilege 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe Token: SeSecurityPrivilege 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe Token: SeSecurityPrivilege 1364 cmd.exe Token: SeManageVolumePrivilege 1952 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WinMail.exepid process 1952 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WinMail.exepid process 1952 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 1952 WinMail.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exezoyv.exedescription pid process target process PID 1044 wrote to memory of 300 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe zoyv.exe PID 1044 wrote to memory of 300 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe zoyv.exe PID 1044 wrote to memory of 300 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe zoyv.exe PID 1044 wrote to memory of 300 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe zoyv.exe PID 300 wrote to memory of 1112 300 zoyv.exe taskhost.exe PID 300 wrote to memory of 1112 300 zoyv.exe taskhost.exe PID 300 wrote to memory of 1112 300 zoyv.exe taskhost.exe PID 300 wrote to memory of 1112 300 zoyv.exe taskhost.exe PID 300 wrote to memory of 1112 300 zoyv.exe taskhost.exe PID 300 wrote to memory of 1168 300 zoyv.exe Dwm.exe PID 300 wrote to memory of 1168 300 zoyv.exe Dwm.exe PID 300 wrote to memory of 1168 300 zoyv.exe Dwm.exe PID 300 wrote to memory of 1168 300 zoyv.exe Dwm.exe PID 300 wrote to memory of 1168 300 zoyv.exe Dwm.exe PID 300 wrote to memory of 1200 300 zoyv.exe Explorer.EXE PID 300 wrote to memory of 1200 300 zoyv.exe Explorer.EXE PID 300 wrote to memory of 1200 300 zoyv.exe Explorer.EXE PID 300 wrote to memory of 1200 300 zoyv.exe Explorer.EXE PID 300 wrote to memory of 1200 300 zoyv.exe Explorer.EXE PID 300 wrote to memory of 1044 300 zoyv.exe 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe PID 300 wrote to memory of 1044 300 zoyv.exe 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe PID 300 wrote to memory of 1044 300 zoyv.exe 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe PID 300 wrote to memory of 1044 300 zoyv.exe 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe PID 300 wrote to memory of 1044 300 zoyv.exe 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe PID 1044 wrote to memory of 1364 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe cmd.exe PID 1044 wrote to memory of 1364 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe cmd.exe PID 1044 wrote to memory of 1364 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe cmd.exe PID 1044 wrote to memory of 1364 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe cmd.exe PID 1044 wrote to memory of 1364 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe cmd.exe PID 1044 wrote to memory of 1364 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe cmd.exe PID 1044 wrote to memory of 1364 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe cmd.exe PID 1044 wrote to memory of 1364 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe cmd.exe PID 1044 wrote to memory of 1364 1044 8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe cmd.exe PID 300 wrote to memory of 1088 300 zoyv.exe conhost.exe PID 300 wrote to memory of 1088 300 zoyv.exe conhost.exe PID 300 wrote to memory of 1088 300 zoyv.exe conhost.exe PID 300 wrote to memory of 1088 300 zoyv.exe conhost.exe PID 300 wrote to memory of 1088 300 zoyv.exe conhost.exe PID 300 wrote to memory of 1952 300 zoyv.exe WinMail.exe PID 300 wrote to memory of 1952 300 zoyv.exe WinMail.exe PID 300 wrote to memory of 1952 300 zoyv.exe WinMail.exe PID 300 wrote to memory of 1952 300 zoyv.exe WinMail.exe PID 300 wrote to memory of 1952 300 zoyv.exe WinMail.exe PID 300 wrote to memory of 1340 300 zoyv.exe DllHost.exe PID 300 wrote to memory of 1340 300 zoyv.exe DllHost.exe PID 300 wrote to memory of 1340 300 zoyv.exe DllHost.exe PID 300 wrote to memory of 1340 300 zoyv.exe DllHost.exe PID 300 wrote to memory of 1340 300 zoyv.exe DllHost.exe PID 300 wrote to memory of 948 300 zoyv.exe DllHost.exe PID 300 wrote to memory of 948 300 zoyv.exe DllHost.exe PID 300 wrote to memory of 948 300 zoyv.exe DllHost.exe PID 300 wrote to memory of 948 300 zoyv.exe DllHost.exe PID 300 wrote to memory of 948 300 zoyv.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe"C:\Users\Admin\AppData\Local\Temp\8e63d2132a48ad8c1ed9300d922b4ba41f45a542030dab78f332942b3490ce6f.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\Zozeem\zoyv.exe"C:\Users\Admin\AppData\Roaming\Zozeem\zoyv.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp49af9f90.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-435356513550955307-858507945-1099116131890109002425751437-299715345898930950"1⤵PID:1088
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1952
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1340
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD532cffec74123b53a8da0e15777223da8
SHA13215b64f0267d6de5f7216858bca5cf4911b3e1f
SHA256cf69df717fc8e77b4a9327a6b872cf7c47565e8ccda392f58e3e18bd7279f604
SHA512206622076b4bc196605b02b596e1d8ae7b2a36dba468d896fa30b5d8f8c9ea7125d220375aa8a8718288993a1f6448ad5553501bb170d9e027526aad91e8085a
-
Filesize
398B
MD58fb62c71e73590360e5ec1cbe43a33ef
SHA1c5ef49235a55419485baeb69fada0335cc74f2a7
SHA256dd2b136db4a09340bcf9a61951b0f1984e6bca500eee70b0682c8b18aaf3a964
SHA5126fd3106f8ec1fb584d2a28ad35d5cc2c97f5383424fa019f37407f12f58e6e960fabfde7e20a8074c41ebd51d0aab118bcd8dfda923acf8c46fbb50c67dbace0
-
Filesize
138KB
MD575ec7e314b8a2320085a8085154df895
SHA1103f555c516fb301fed909341392a234c640a6d4
SHA256356e03164c42b4e351acdabcb0fc28c1a6f32f745aca55a437ec9091c1bf2467
SHA5127db1b62c64786755a46db663d53c9bd1b118e85a5d2984bbb0ca172c333acc1fa951189f7b80f003da20f44b18560ef2c623bdd6e6ead6ac9a562cc43504f856
-
Filesize
138KB
MD575ec7e314b8a2320085a8085154df895
SHA1103f555c516fb301fed909341392a234c640a6d4
SHA256356e03164c42b4e351acdabcb0fc28c1a6f32f745aca55a437ec9091c1bf2467
SHA5127db1b62c64786755a46db663d53c9bd1b118e85a5d2984bbb0ca172c333acc1fa951189f7b80f003da20f44b18560ef2c623bdd6e6ead6ac9a562cc43504f856
-
Filesize
138KB
MD575ec7e314b8a2320085a8085154df895
SHA1103f555c516fb301fed909341392a234c640a6d4
SHA256356e03164c42b4e351acdabcb0fc28c1a6f32f745aca55a437ec9091c1bf2467
SHA5127db1b62c64786755a46db663d53c9bd1b118e85a5d2984bbb0ca172c333acc1fa951189f7b80f003da20f44b18560ef2c623bdd6e6ead6ac9a562cc43504f856
-
Filesize
138KB
MD575ec7e314b8a2320085a8085154df895
SHA1103f555c516fb301fed909341392a234c640a6d4
SHA256356e03164c42b4e351acdabcb0fc28c1a6f32f745aca55a437ec9091c1bf2467
SHA5127db1b62c64786755a46db663d53c9bd1b118e85a5d2984bbb0ca172c333acc1fa951189f7b80f003da20f44b18560ef2c623bdd6e6ead6ac9a562cc43504f856