Analysis
-
max time kernel
100s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:36
Static task
static1
Behavioral task
behavioral1
Sample
9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe
Resource
win10v2004-20220812-en
General
-
Target
9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe
-
Size
284KB
-
MD5
d4bada7dc36cecb9103aa0c4c3da86ec
-
SHA1
5b79c30842bdbddbea7c06b224c4f56cc49cd904
-
SHA256
9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811
-
SHA512
927e0659d12df7cf28bf491649df69fae5245f4a642c44e932646e5a7f1d2d07eb398946c2b1ab964cf92de5418c8b9b7e4ec207414db6e50f819c042f8ec9bf
-
SSDEEP
6144:nrGy4dp5EUQmsBglXEOPdn/oocj+bjmmYVSx6Le46u+LqduD:nx4dp5Fyq39QryYMx6LyKw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ezycu.exepid process 1636 ezycu.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1224 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exepid process 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exedescription pid process target process PID 1668 set thread context of 1224 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe cmd.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\28817826-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ezycu.exepid process 1636 ezycu.exe 1636 ezycu.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exeezycu.exepid process 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe 1636 ezycu.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe Token: SeManageVolumePrivilege 1664 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WinMail.exepid process 1664 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WinMail.exepid process 1664 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 1664 WinMail.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exeezycu.exeexplorer.exedescription pid process target process PID 1668 wrote to memory of 1636 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe ezycu.exe PID 1668 wrote to memory of 1636 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe ezycu.exe PID 1668 wrote to memory of 1636 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe ezycu.exe PID 1668 wrote to memory of 1636 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe ezycu.exe PID 1636 wrote to memory of 1156 1636 ezycu.exe explorer.exe PID 1636 wrote to memory of 1156 1636 ezycu.exe explorer.exe PID 1636 wrote to memory of 1156 1636 ezycu.exe explorer.exe PID 1636 wrote to memory of 1156 1636 ezycu.exe explorer.exe PID 1636 wrote to memory of 1156 1636 ezycu.exe explorer.exe PID 1636 wrote to memory of 1156 1636 ezycu.exe explorer.exe PID 1636 wrote to memory of 1156 1636 ezycu.exe explorer.exe PID 1636 wrote to memory of 1156 1636 ezycu.exe explorer.exe PID 1636 wrote to memory of 1156 1636 ezycu.exe explorer.exe PID 1636 wrote to memory of 1156 1636 ezycu.exe explorer.exe PID 1636 wrote to memory of 1156 1636 ezycu.exe explorer.exe PID 1156 wrote to memory of 1272 1156 explorer.exe Explorer.EXE PID 1156 wrote to memory of 1272 1156 explorer.exe Explorer.EXE PID 1156 wrote to memory of 1272 1156 explorer.exe Explorer.EXE PID 1636 wrote to memory of 1668 1636 ezycu.exe 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe PID 1636 wrote to memory of 1668 1636 ezycu.exe 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe PID 1636 wrote to memory of 1668 1636 ezycu.exe 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe PID 1636 wrote to memory of 1668 1636 ezycu.exe 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe PID 1636 wrote to memory of 1668 1636 ezycu.exe 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe PID 1636 wrote to memory of 1668 1636 ezycu.exe 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe PID 1636 wrote to memory of 1668 1636 ezycu.exe 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe PID 1668 wrote to memory of 1224 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe cmd.exe PID 1668 wrote to memory of 1224 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe cmd.exe PID 1668 wrote to memory of 1224 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe cmd.exe PID 1668 wrote to memory of 1224 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe cmd.exe PID 1668 wrote to memory of 1224 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe cmd.exe PID 1668 wrote to memory of 1224 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe cmd.exe PID 1668 wrote to memory of 1224 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe cmd.exe PID 1668 wrote to memory of 1224 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe cmd.exe PID 1668 wrote to memory of 1224 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe cmd.exe PID 1668 wrote to memory of 1224 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe cmd.exe PID 1668 wrote to memory of 1224 1668 9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe"C:\Users\Admin\AppData\Local\Temp\9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\Xoundy\ezycu.exe"C:\Users\Admin\AppData\Roaming\Xoundy\ezycu.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"4⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp25825f24.bat"3⤵
- Deletes itself
PID:1224
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5b2de610f09ae3b3cf04dbab10f6653cc
SHA1d6a4f10452a63213d0a237f0bfd60a68b379b3bb
SHA25684e260b49ae0a67864215dfd749c1dc1d28a42f0cca3cf3b2e8c3f8b6eb069b8
SHA512602120c16978ce3e576c76ac1dcfc8baba81cf8e070b7776e613c2998b0d38b78c1106039083187f83ae92336b6f66e6478437ff49b97cc62f3264501a4ffa25
-
Filesize
284KB
MD5bffc3b29ba49105056a0683510a691af
SHA1c711e63ceaaba6bcf564dfb34548e4140fe65fc6
SHA2562c0d3d2192a0802b8beccf5df164b8cfd2d36b87712949721ad0b396087d0377
SHA5124a5958d877a1c1371c67de3b56c0fa2060f6b614222753cac525ae1f462b43bf8179b65446af5c30bd2e5394a6f7a6155e3592b4126b3d1a3cca585629f5d0c1
-
Filesize
284KB
MD5bffc3b29ba49105056a0683510a691af
SHA1c711e63ceaaba6bcf564dfb34548e4140fe65fc6
SHA2562c0d3d2192a0802b8beccf5df164b8cfd2d36b87712949721ad0b396087d0377
SHA5124a5958d877a1c1371c67de3b56c0fa2060f6b614222753cac525ae1f462b43bf8179b65446af5c30bd2e5394a6f7a6155e3592b4126b3d1a3cca585629f5d0c1
-
Filesize
284KB
MD5bffc3b29ba49105056a0683510a691af
SHA1c711e63ceaaba6bcf564dfb34548e4140fe65fc6
SHA2562c0d3d2192a0802b8beccf5df164b8cfd2d36b87712949721ad0b396087d0377
SHA5124a5958d877a1c1371c67de3b56c0fa2060f6b614222753cac525ae1f462b43bf8179b65446af5c30bd2e5394a6f7a6155e3592b4126b3d1a3cca585629f5d0c1