Analysis

  • max time kernel
    100s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:36

General

  • Target

    9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe

  • Size

    284KB

  • MD5

    d4bada7dc36cecb9103aa0c4c3da86ec

  • SHA1

    5b79c30842bdbddbea7c06b224c4f56cc49cd904

  • SHA256

    9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811

  • SHA512

    927e0659d12df7cf28bf491649df69fae5245f4a642c44e932646e5a7f1d2d07eb398946c2b1ab964cf92de5418c8b9b7e4ec207414db6e50f819c042f8ec9bf

  • SSDEEP

    6144:nrGy4dp5EUQmsBglXEOPdn/oocj+bjmmYVSx6Le46u+LqduD:nx4dp5Fyq39QryYMx6LyKw

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1272
      • C:\Users\Admin\AppData\Local\Temp\9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe
        "C:\Users\Admin\AppData\Local\Temp\9680c5a21334779e858c88dd01d35fafedd2d359080f813771f8de8c55dca811.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1668
        • C:\Users\Admin\AppData\Roaming\Xoundy\ezycu.exe
          "C:\Users\Admin\AppData\Roaming\Xoundy\ezycu.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of WriteProcessMemory
          PID:1636
          • C:\Windows\SysWOW64\explorer.exe
            "C:\Windows\SysWOW64\explorer.exe"
            4⤵
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1156
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp25825f24.bat"
          3⤵
          • Deletes itself
          PID:1224
    • C:\Program Files\Windows Mail\WinMail.exe
      "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
      1⤵
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1664

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp25825f24.bat

      Filesize

      307B

      MD5

      b2de610f09ae3b3cf04dbab10f6653cc

      SHA1

      d6a4f10452a63213d0a237f0bfd60a68b379b3bb

      SHA256

      84e260b49ae0a67864215dfd749c1dc1d28a42f0cca3cf3b2e8c3f8b6eb069b8

      SHA512

      602120c16978ce3e576c76ac1dcfc8baba81cf8e070b7776e613c2998b0d38b78c1106039083187f83ae92336b6f66e6478437ff49b97cc62f3264501a4ffa25

    • C:\Users\Admin\AppData\Roaming\Xoundy\ezycu.exe

      Filesize

      284KB

      MD5

      bffc3b29ba49105056a0683510a691af

      SHA1

      c711e63ceaaba6bcf564dfb34548e4140fe65fc6

      SHA256

      2c0d3d2192a0802b8beccf5df164b8cfd2d36b87712949721ad0b396087d0377

      SHA512

      4a5958d877a1c1371c67de3b56c0fa2060f6b614222753cac525ae1f462b43bf8179b65446af5c30bd2e5394a6f7a6155e3592b4126b3d1a3cca585629f5d0c1

    • C:\Users\Admin\AppData\Roaming\Xoundy\ezycu.exe

      Filesize

      284KB

      MD5

      bffc3b29ba49105056a0683510a691af

      SHA1

      c711e63ceaaba6bcf564dfb34548e4140fe65fc6

      SHA256

      2c0d3d2192a0802b8beccf5df164b8cfd2d36b87712949721ad0b396087d0377

      SHA512

      4a5958d877a1c1371c67de3b56c0fa2060f6b614222753cac525ae1f462b43bf8179b65446af5c30bd2e5394a6f7a6155e3592b4126b3d1a3cca585629f5d0c1

    • \Users\Admin\AppData\Roaming\Xoundy\ezycu.exe

      Filesize

      284KB

      MD5

      bffc3b29ba49105056a0683510a691af

      SHA1

      c711e63ceaaba6bcf564dfb34548e4140fe65fc6

      SHA256

      2c0d3d2192a0802b8beccf5df164b8cfd2d36b87712949721ad0b396087d0377

      SHA512

      4a5958d877a1c1371c67de3b56c0fa2060f6b614222753cac525ae1f462b43bf8179b65446af5c30bd2e5394a6f7a6155e3592b4126b3d1a3cca585629f5d0c1

    • memory/1156-76-0x0000000074FF1000-0x0000000074FF3000-memory.dmp

      Filesize

      8KB

    • memory/1156-77-0x0000000000080000-0x00000000000AC000-memory.dmp

      Filesize

      176KB

    • memory/1156-73-0x0000000000080000-0x00000000000AC000-memory.dmp

      Filesize

      176KB

    • memory/1156-74-0x0000000000000000-mapping.dmp

    • memory/1156-101-0x0000000000080000-0x00000000000AC000-memory.dmp

      Filesize

      176KB

    • memory/1156-66-0x0000000000080000-0x00000000000AC000-memory.dmp

      Filesize

      176KB

    • memory/1156-68-0x0000000000080000-0x00000000000AC000-memory.dmp

      Filesize

      176KB

    • memory/1156-71-0x0000000000080000-0x00000000000AC000-memory.dmp

      Filesize

      176KB

    • memory/1156-72-0x0000000000080000-0x00000000000AC000-memory.dmp

      Filesize

      176KB

    • memory/1156-70-0x0000000000080000-0x00000000000AC000-memory.dmp

      Filesize

      176KB

    • memory/1156-69-0x0000000000080000-0x00000000000AC000-memory.dmp

      Filesize

      176KB

    • memory/1224-104-0x0000000000170000-0x000000000019C000-memory.dmp

      Filesize

      176KB

    • memory/1224-106-0x0000000000170000-0x000000000019C000-memory.dmp

      Filesize

      176KB

    • memory/1224-116-0x0000000000170000-0x000000000019C000-memory.dmp

      Filesize

      176KB

    • memory/1224-114-0x0000000000170000-0x000000000019C000-memory.dmp

      Filesize

      176KB

    • memory/1224-111-0x000000000018F44C-mapping.dmp

    • memory/1224-110-0x0000000000170000-0x000000000019C000-memory.dmp

      Filesize

      176KB

    • memory/1224-109-0x0000000000170000-0x000000000019C000-memory.dmp

      Filesize

      176KB

    • memory/1224-108-0x0000000000170000-0x000000000019C000-memory.dmp

      Filesize

      176KB

    • memory/1224-107-0x0000000000170000-0x000000000019C000-memory.dmp

      Filesize

      176KB

    • memory/1636-62-0x00000000026A0000-0x0000000002735000-memory.dmp

      Filesize

      596KB

    • memory/1636-59-0x0000000000000000-mapping.dmp

    • memory/1636-63-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/1664-86-0x0000000002400000-0x0000000002410000-memory.dmp

      Filesize

      64KB

    • memory/1664-80-0x00000000023A0000-0x00000000023B0000-memory.dmp

      Filesize

      64KB

    • memory/1664-78-0x000007FEFC2C1000-0x000007FEFC2C3000-memory.dmp

      Filesize

      8KB

    • memory/1664-79-0x000007FEF6CE1000-0x000007FEF6CE3000-memory.dmp

      Filesize

      8KB

    • memory/1668-96-0x00000000005E0000-0x000000000060C000-memory.dmp

      Filesize

      176KB

    • memory/1668-98-0x00000000005E0000-0x000000000060C000-memory.dmp

      Filesize

      176KB

    • memory/1668-97-0x00000000005E0000-0x000000000060C000-memory.dmp

      Filesize

      176KB

    • memory/1668-100-0x00000000005E0000-0x000000000060C000-memory.dmp

      Filesize

      176KB

    • memory/1668-94-0x00000000005E0000-0x000000000060C000-memory.dmp

      Filesize

      176KB

    • memory/1668-99-0x00000000005E0000-0x000000000060C000-memory.dmp

      Filesize

      176KB

    • memory/1668-112-0x00000000005E0000-0x000000000060C000-memory.dmp

      Filesize

      176KB

    • memory/1668-54-0x0000000075C81000-0x0000000075C83000-memory.dmp

      Filesize

      8KB

    • memory/1668-55-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/1668-57-0x00000000024E0000-0x0000000002575000-memory.dmp

      Filesize

      596KB