Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:56
Static task
static1
Behavioral task
behavioral1
Sample
76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe
Resource
win10v2004-20220812-en
General
-
Target
76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe
-
Size
292KB
-
MD5
c3e115ea525f4202ed2e945269d50f38
-
SHA1
7fcc872227e97394f71163cf52050835287d7e6c
-
SHA256
76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863
-
SHA512
f0eb51951f6de6767ce80c782c868738732cb6935e9a3ccf15818a32b2ee436092268f5c18dc1a4e0d93a701e9a7550b65cb3beef7656bf1ac6e728c3fd873f4
-
SSDEEP
6144:dDXUje2+6SbP3P0/yGtjtep28DOUj2XV/1fGb/QvPNyWTI:9XUjH+pP0RBtW2m3cV/4TQvLT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
temeij.exepid process 1512 temeij.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 764 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exepid process 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
temeij.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run temeij.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Temeij = "C:\\Users\\Admin\\AppData\\Roaming\\Avyr\\temeij.exe" temeij.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exedescription pid process target process PID 1192 set thread context of 764 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
temeij.exepid process 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe 1512 temeij.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exetemeij.exedescription pid process target process PID 1192 wrote to memory of 1512 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe temeij.exe PID 1192 wrote to memory of 1512 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe temeij.exe PID 1192 wrote to memory of 1512 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe temeij.exe PID 1192 wrote to memory of 1512 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe temeij.exe PID 1512 wrote to memory of 1120 1512 temeij.exe taskhost.exe PID 1512 wrote to memory of 1120 1512 temeij.exe taskhost.exe PID 1512 wrote to memory of 1120 1512 temeij.exe taskhost.exe PID 1512 wrote to memory of 1120 1512 temeij.exe taskhost.exe PID 1512 wrote to memory of 1120 1512 temeij.exe taskhost.exe PID 1512 wrote to memory of 1184 1512 temeij.exe Dwm.exe PID 1512 wrote to memory of 1184 1512 temeij.exe Dwm.exe PID 1512 wrote to memory of 1184 1512 temeij.exe Dwm.exe PID 1512 wrote to memory of 1184 1512 temeij.exe Dwm.exe PID 1512 wrote to memory of 1184 1512 temeij.exe Dwm.exe PID 1512 wrote to memory of 1248 1512 temeij.exe Explorer.EXE PID 1512 wrote to memory of 1248 1512 temeij.exe Explorer.EXE PID 1512 wrote to memory of 1248 1512 temeij.exe Explorer.EXE PID 1512 wrote to memory of 1248 1512 temeij.exe Explorer.EXE PID 1512 wrote to memory of 1248 1512 temeij.exe Explorer.EXE PID 1512 wrote to memory of 1192 1512 temeij.exe 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe PID 1512 wrote to memory of 1192 1512 temeij.exe 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe PID 1512 wrote to memory of 1192 1512 temeij.exe 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe PID 1512 wrote to memory of 1192 1512 temeij.exe 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe PID 1512 wrote to memory of 1192 1512 temeij.exe 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe PID 1192 wrote to memory of 764 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe cmd.exe PID 1192 wrote to memory of 764 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe cmd.exe PID 1192 wrote to memory of 764 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe cmd.exe PID 1192 wrote to memory of 764 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe cmd.exe PID 1192 wrote to memory of 764 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe cmd.exe PID 1192 wrote to memory of 764 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe cmd.exe PID 1192 wrote to memory of 764 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe cmd.exe PID 1192 wrote to memory of 764 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe cmd.exe PID 1192 wrote to memory of 764 1192 76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe"C:\Users\Admin\AppData\Local\Temp\76fda38844994b8426f1c54ea9088590bf726deb0adc6840016d498303b47863.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Roaming\Avyr\temeij.exe"C:\Users\Admin\AppData\Roaming\Avyr\temeij.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1512
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\VXXF067.bat"3⤵
- Deletes itself
PID:764
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD586c8c8a3d1aa57642df4e88dcb9ffb18
SHA10822d6254b5c4c1e2d95533e8e8ce51a0887ad69
SHA256fa11a9296dfded6c2016d543ebc72b8123cd1368c2237f6347a42c7fd0ec9777
SHA512856037b4791ebcf29c88840288cc8e9c280d11f86483d5a884fea91159cca6450590f8ce79ae57443506a11bcb6981b532b863c4f67374260bef06c5208c601f
-
Filesize
292KB
MD53824c18319c5a1c0c8f6873aff88f760
SHA1527c3f8724a576f2e0454f19db3d358bfa23a25c
SHA25693d588176a5a8759bbdba741876545460eb16c0f8c6ae41600ee9aee3170624f
SHA512997354f1edd27c34532a27c92bd68ab48bc59d4ecacd224618aab07c8371a3b9e6b90eb3880afd7d8b98429cd532b4f7552dbc6e52f92d7dfb9a788524312fa1
-
Filesize
292KB
MD53824c18319c5a1c0c8f6873aff88f760
SHA1527c3f8724a576f2e0454f19db3d358bfa23a25c
SHA25693d588176a5a8759bbdba741876545460eb16c0f8c6ae41600ee9aee3170624f
SHA512997354f1edd27c34532a27c92bd68ab48bc59d4ecacd224618aab07c8371a3b9e6b90eb3880afd7d8b98429cd532b4f7552dbc6e52f92d7dfb9a788524312fa1
-
Filesize
292KB
MD53824c18319c5a1c0c8f6873aff88f760
SHA1527c3f8724a576f2e0454f19db3d358bfa23a25c
SHA25693d588176a5a8759bbdba741876545460eb16c0f8c6ae41600ee9aee3170624f
SHA512997354f1edd27c34532a27c92bd68ab48bc59d4ecacd224618aab07c8371a3b9e6b90eb3880afd7d8b98429cd532b4f7552dbc6e52f92d7dfb9a788524312fa1
-
Filesize
292KB
MD53824c18319c5a1c0c8f6873aff88f760
SHA1527c3f8724a576f2e0454f19db3d358bfa23a25c
SHA25693d588176a5a8759bbdba741876545460eb16c0f8c6ae41600ee9aee3170624f
SHA512997354f1edd27c34532a27c92bd68ab48bc59d4ecacd224618aab07c8371a3b9e6b90eb3880afd7d8b98429cd532b4f7552dbc6e52f92d7dfb9a788524312fa1