Analysis
-
max time kernel
148s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:45
Static task
static1
Behavioral task
behavioral1
Sample
88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe
Resource
win10v2004-20221111-en
General
-
Target
88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe
-
Size
314KB
-
MD5
88cec7ee32c69ec345641457b99fa642
-
SHA1
2319981e0ddcd42473b66e8140b4da21bf174de5
-
SHA256
88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a
-
SHA512
7994f1042a8d0c2eab589cff94ca6429dddcae73d4b8d6118f172175e329b6af6bdf7ee6be077873099a1021b84e73d0c8182ec757997974a2191e8de89afb27
-
SSDEEP
6144:ljGfV+EP4+FT+U0jLL/RmRxjuJHXI0u0+4c3+L:1GfV+U+U0jP5mRxCHX6T3K
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
syki.exesyki.exepid process 1568 syki.exe 748 syki.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 920 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exepid process 1464 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe 1464 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\{2354EFA1-C740-BD7D-D045-EBE4E60A83CA} = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mievm\\syki.exe\"" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exesyki.exedescription pid process target process PID 1616 set thread context of 1464 1616 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe PID 1568 set thread context of 748 1568 syki.exe syki.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\4D1D2C61-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exesyki.exesyki.exeexplorer.exepid process 1616 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe 1616 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe 1568 syki.exe 1568 syki.exe 748 syki.exe 748 syki.exe 792 explorer.exe 792 explorer.exe 792 explorer.exe 792 explorer.exe 792 explorer.exe 792 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
syki.exepid process 748 syki.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 1464 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe Token: SeManageVolumePrivilege 1276 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WinMail.exepid process 1276 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WinMail.exepid process 1276 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 1276 WinMail.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exesyki.exesyki.exeexplorer.exedescription pid process target process PID 1616 wrote to memory of 1464 1616 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe PID 1616 wrote to memory of 1464 1616 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe PID 1616 wrote to memory of 1464 1616 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe PID 1616 wrote to memory of 1464 1616 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe PID 1616 wrote to memory of 1464 1616 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe PID 1616 wrote to memory of 1464 1616 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe PID 1616 wrote to memory of 1464 1616 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe PID 1616 wrote to memory of 1464 1616 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe PID 1616 wrote to memory of 1464 1616 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe PID 1616 wrote to memory of 1464 1616 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe PID 1464 wrote to memory of 1568 1464 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe syki.exe PID 1464 wrote to memory of 1568 1464 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe syki.exe PID 1464 wrote to memory of 1568 1464 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe syki.exe PID 1464 wrote to memory of 1568 1464 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe syki.exe PID 1568 wrote to memory of 748 1568 syki.exe syki.exe PID 1568 wrote to memory of 748 1568 syki.exe syki.exe PID 1568 wrote to memory of 748 1568 syki.exe syki.exe PID 1568 wrote to memory of 748 1568 syki.exe syki.exe PID 1568 wrote to memory of 748 1568 syki.exe syki.exe PID 1568 wrote to memory of 748 1568 syki.exe syki.exe PID 1568 wrote to memory of 748 1568 syki.exe syki.exe PID 1568 wrote to memory of 748 1568 syki.exe syki.exe PID 1568 wrote to memory of 748 1568 syki.exe syki.exe PID 1568 wrote to memory of 748 1568 syki.exe syki.exe PID 1464 wrote to memory of 920 1464 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe cmd.exe PID 1464 wrote to memory of 920 1464 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe cmd.exe PID 1464 wrote to memory of 920 1464 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe cmd.exe PID 1464 wrote to memory of 920 1464 88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe cmd.exe PID 748 wrote to memory of 792 748 syki.exe explorer.exe PID 748 wrote to memory of 792 748 syki.exe explorer.exe PID 748 wrote to memory of 792 748 syki.exe explorer.exe PID 748 wrote to memory of 792 748 syki.exe explorer.exe PID 792 wrote to memory of 1244 792 explorer.exe Explorer.EXE PID 792 wrote to memory of 1244 792 explorer.exe Explorer.EXE PID 792 wrote to memory of 1244 792 explorer.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe"C:\Users\Admin\AppData\Local\Temp\88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe"C:\Users\Admin\AppData\Local\Temp\88e56de48e4234d44d68cad33b4173003505a23be4c6681f2c4390d8a9b7d13a.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Roaming\Mievm\syki.exe"C:\Users\Admin\AppData\Roaming\Mievm\syki.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Roaming\Mievm\syki.exe"C:\Users\Admin\AppData\Roaming\Mievm\syki.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"6⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp19b74aa0.bat"4⤵
- Deletes itself
PID:920
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD59916fe4d65536df94f62b7189fd32a61
SHA10285ee962315561ab20094dd9c9e3c566feb1454
SHA25667a73ae78077c752b78320a0627af0f7dcad525773060a01944c81e003d9ed23
SHA512efec0f213f118eec1c91e47f834860582023d87460a4cffa12a2b35daa94814a533ecc81981a899d2192631e246df3bae1182f57d5b995089ce0febb44a7c09b
-
Filesize
314KB
MD5157f77921821340ac1e824e0a1fb4da5
SHA12144c39bee8ea08f2790bad66e5e667ede183ebb
SHA25694bbb5c5a97e74195356cf7dd7d64dd297e39c22b1b1f0999f24620e7b1cde03
SHA512e7cace9de3b703977b05263654584db896954ed0629d743be3d24e5a4d6116622f7ae39558fd59d99ba05e75c709d7d64f6ec53018a2889bbdef96f15af7ea70
-
Filesize
314KB
MD5157f77921821340ac1e824e0a1fb4da5
SHA12144c39bee8ea08f2790bad66e5e667ede183ebb
SHA25694bbb5c5a97e74195356cf7dd7d64dd297e39c22b1b1f0999f24620e7b1cde03
SHA512e7cace9de3b703977b05263654584db896954ed0629d743be3d24e5a4d6116622f7ae39558fd59d99ba05e75c709d7d64f6ec53018a2889bbdef96f15af7ea70
-
Filesize
314KB
MD5157f77921821340ac1e824e0a1fb4da5
SHA12144c39bee8ea08f2790bad66e5e667ede183ebb
SHA25694bbb5c5a97e74195356cf7dd7d64dd297e39c22b1b1f0999f24620e7b1cde03
SHA512e7cace9de3b703977b05263654584db896954ed0629d743be3d24e5a4d6116622f7ae39558fd59d99ba05e75c709d7d64f6ec53018a2889bbdef96f15af7ea70
-
Filesize
314KB
MD5157f77921821340ac1e824e0a1fb4da5
SHA12144c39bee8ea08f2790bad66e5e667ede183ebb
SHA25694bbb5c5a97e74195356cf7dd7d64dd297e39c22b1b1f0999f24620e7b1cde03
SHA512e7cace9de3b703977b05263654584db896954ed0629d743be3d24e5a4d6116622f7ae39558fd59d99ba05e75c709d7d64f6ec53018a2889bbdef96f15af7ea70
-
Filesize
314KB
MD5157f77921821340ac1e824e0a1fb4da5
SHA12144c39bee8ea08f2790bad66e5e667ede183ebb
SHA25694bbb5c5a97e74195356cf7dd7d64dd297e39c22b1b1f0999f24620e7b1cde03
SHA512e7cace9de3b703977b05263654584db896954ed0629d743be3d24e5a4d6116622f7ae39558fd59d99ba05e75c709d7d64f6ec53018a2889bbdef96f15af7ea70