Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:51
Static task
static1
Behavioral task
behavioral1
Sample
e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe
Resource
win10v2004-20221111-en
General
-
Target
e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe
-
Size
300KB
-
MD5
cd54cb1f4864bce38f8d0119c24b2222
-
SHA1
e67b482d112804fc244d2ec34b235c577d9d7d79
-
SHA256
e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd
-
SHA512
73409373004ed8b0c6db1e519b3e2b34883f80bc628121db56e96a4a504d5f4336406e7d3bee53c6a4c7380fe27f390c23884254448cb376479ae81c9ec2b0e9
-
SSDEEP
6144:D6XgdcbBWNIgx+l4Am5Q7kHdZisdYS8Byw9zqzeHruHXaRr7Z+uZA4MAyWX:+QdcbBRgIlM50kHdZiIzw9zoeHruHXaW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
epzyte.exepid process 820 epzyte.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 536 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exepid process 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
epzyte.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run epzyte.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Epzyte = "C:\\Users\\Admin\\AppData\\Roaming\\Petiyj\\epzyte.exe" epzyte.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exedescription pid process target process PID 1724 set thread context of 536 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
epzyte.exepid process 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe 820 epzyte.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exeepzyte.exedescription pid process target process PID 1724 wrote to memory of 820 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe epzyte.exe PID 1724 wrote to memory of 820 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe epzyte.exe PID 1724 wrote to memory of 820 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe epzyte.exe PID 1724 wrote to memory of 820 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe epzyte.exe PID 820 wrote to memory of 1200 820 epzyte.exe taskhost.exe PID 820 wrote to memory of 1200 820 epzyte.exe taskhost.exe PID 820 wrote to memory of 1200 820 epzyte.exe taskhost.exe PID 820 wrote to memory of 1200 820 epzyte.exe taskhost.exe PID 820 wrote to memory of 1200 820 epzyte.exe taskhost.exe PID 820 wrote to memory of 1308 820 epzyte.exe Dwm.exe PID 820 wrote to memory of 1308 820 epzyte.exe Dwm.exe PID 820 wrote to memory of 1308 820 epzyte.exe Dwm.exe PID 820 wrote to memory of 1308 820 epzyte.exe Dwm.exe PID 820 wrote to memory of 1308 820 epzyte.exe Dwm.exe PID 820 wrote to memory of 1348 820 epzyte.exe Explorer.EXE PID 820 wrote to memory of 1348 820 epzyte.exe Explorer.EXE PID 820 wrote to memory of 1348 820 epzyte.exe Explorer.EXE PID 820 wrote to memory of 1348 820 epzyte.exe Explorer.EXE PID 820 wrote to memory of 1348 820 epzyte.exe Explorer.EXE PID 820 wrote to memory of 1724 820 epzyte.exe e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe PID 820 wrote to memory of 1724 820 epzyte.exe e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe PID 820 wrote to memory of 1724 820 epzyte.exe e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe PID 820 wrote to memory of 1724 820 epzyte.exe e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe PID 820 wrote to memory of 1724 820 epzyte.exe e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe PID 1724 wrote to memory of 536 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe cmd.exe PID 1724 wrote to memory of 536 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe cmd.exe PID 1724 wrote to memory of 536 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe cmd.exe PID 1724 wrote to memory of 536 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe cmd.exe PID 1724 wrote to memory of 536 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe cmd.exe PID 1724 wrote to memory of 536 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe cmd.exe PID 1724 wrote to memory of 536 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe cmd.exe PID 1724 wrote to memory of 536 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe cmd.exe PID 1724 wrote to memory of 536 1724 e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe"C:\Users\Admin\AppData\Local\Temp\e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\Petiyj\epzyte.exe"C:\Users\Admin\AppData\Roaming\Petiyj\epzyte.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\PKN5909.bat"3⤵
- Deletes itself
PID:536
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1308
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD594e17518d0a87dab03a221821e6214f9
SHA138a531ea9dcb4008baed7ed914f92d5705cbdca6
SHA25662f03f237972cc3f7b05a7f158eb4a6b6e98a7c1224c177bff04d01cc7cbd26d
SHA512f3b43e3c5fa543bf57c265c53bcad9c6ec82809876effd5b9a5bbf2e41d58fb235d805e548b4c97f6ade22c16ac78ed37f6e82644504f0ec47a8187385f8baab
-
Filesize
300KB
MD50a0cd1fd74ea907923cf0ab1db2d5a96
SHA1c2eb1bf4b15537b0b8f01a13043cfee65938ee48
SHA25698cd0ec447d12e5d4503bf64b7181b0cf7c08901a4af55d339a7a44253d68293
SHA51292a12d38ea63f6f30f1c2898e89460edc9cf9d1208ef0622e36b089541a3ae22f8efb15c8f67e52a363cab6ef74110f712a546b5a8f626331c48ff31d2749e33
-
Filesize
300KB
MD50a0cd1fd74ea907923cf0ab1db2d5a96
SHA1c2eb1bf4b15537b0b8f01a13043cfee65938ee48
SHA25698cd0ec447d12e5d4503bf64b7181b0cf7c08901a4af55d339a7a44253d68293
SHA51292a12d38ea63f6f30f1c2898e89460edc9cf9d1208ef0622e36b089541a3ae22f8efb15c8f67e52a363cab6ef74110f712a546b5a8f626331c48ff31d2749e33
-
Filesize
300KB
MD50a0cd1fd74ea907923cf0ab1db2d5a96
SHA1c2eb1bf4b15537b0b8f01a13043cfee65938ee48
SHA25698cd0ec447d12e5d4503bf64b7181b0cf7c08901a4af55d339a7a44253d68293
SHA51292a12d38ea63f6f30f1c2898e89460edc9cf9d1208ef0622e36b089541a3ae22f8efb15c8f67e52a363cab6ef74110f712a546b5a8f626331c48ff31d2749e33
-
Filesize
300KB
MD50a0cd1fd74ea907923cf0ab1db2d5a96
SHA1c2eb1bf4b15537b0b8f01a13043cfee65938ee48
SHA25698cd0ec447d12e5d4503bf64b7181b0cf7c08901a4af55d339a7a44253d68293
SHA51292a12d38ea63f6f30f1c2898e89460edc9cf9d1208ef0622e36b089541a3ae22f8efb15c8f67e52a363cab6ef74110f712a546b5a8f626331c48ff31d2749e33