Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:05
Static task
static1
Behavioral task
behavioral1
Sample
cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe
Resource
win10v2004-20220812-en
General
-
Target
cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe
-
Size
421KB
-
MD5
832bb1fb1bedc1a6d3deb63d3636413d
-
SHA1
edbbff0b8c1f221eca26129bf59b2104e172e2e9
-
SHA256
cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795
-
SHA512
4b574aba9bd7a77d47af5febe502200e558c1004e7a3f4846526e852668e3d5a076abdd611804da5a897be094adcad21cbd257269fde5f31f5f012c3c9014829
-
SSDEEP
6144:Vv5x0A5+vNcUTcvaXJAjwKKx4DF9UQuscjSu3Oau+7qh7SVWl/iYus:F5x0AEveULotKx40QuscGxBP7t/iLs
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
ELykrxMDBOkc.exepid process 320 ELykrxMDBOkc.exe -
Processes:
resource yara_rule behavioral1/memory/1900-57-0x0000000000400000-0x000000000049C000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exepid process 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ELykrxMDBOkc.exe = "C:\\ProgramData\\ELykrxMDBOkc.exe" cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe -
Processes:
cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Download cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exepid process 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exedescription pid process target process PID 1900 wrote to memory of 320 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe ELykrxMDBOkc.exe PID 1900 wrote to memory of 320 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe ELykrxMDBOkc.exe PID 1900 wrote to memory of 320 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe ELykrxMDBOkc.exe PID 1900 wrote to memory of 320 1900 cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe ELykrxMDBOkc.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe"C:\Users\Admin\AppData\Local\Temp\cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1900 -
C:\ProgramData\ELykrxMDBOkc.exeC:\ProgramData\ELykrxMDBOkc.exe2⤵
- Executes dropped EXE
PID:320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
421KB
MD5832bb1fb1bedc1a6d3deb63d3636413d
SHA1edbbff0b8c1f221eca26129bf59b2104e172e2e9
SHA256cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795
SHA5124b574aba9bd7a77d47af5febe502200e558c1004e7a3f4846526e852668e3d5a076abdd611804da5a897be094adcad21cbd257269fde5f31f5f012c3c9014829
-
Filesize
421KB
MD5832bb1fb1bedc1a6d3deb63d3636413d
SHA1edbbff0b8c1f221eca26129bf59b2104e172e2e9
SHA256cdbdb6e1eb0e3b72b0338cead42409aabd1866a8524ebd66fcf4b0933bbdb795
SHA5124b574aba9bd7a77d47af5febe502200e558c1004e7a3f4846526e852668e3d5a076abdd611804da5a897be094adcad21cbd257269fde5f31f5f012c3c9014829