Analysis
-
max time kernel
154s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:40
Static task
static1
Behavioral task
behavioral1
Sample
2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe
Resource
win10v2004-20221111-en
General
-
Target
2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe
-
Size
270KB
-
MD5
b956bce75c05e483f6b6e5a87a78da60
-
SHA1
cfa722912249d42d8f713918ea85f02c1f9e22d1
-
SHA256
2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe
-
SHA512
6f73a55cce3f91726342b05d5170a29dfa5407c7f8360339ae65a7bcad4226e65a41030650b659f59b843d01a902a163379d1650bd9b98abda107254c11439fb
-
SSDEEP
3072:F90nbyJIZIascP+NjVyBjA+ACL/eUNZItRoHHjAD0M1BQBKOnFpJCGGGGG9M2hd:keCfs4+VCA+FL2UNZlH6loK7GGGGGG2D
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
aqvu.exeaqvu.exepid process 1184 aqvu.exe 1384 aqvu.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 748 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exepid process 828 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe 828 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exeaqvu.exedescription pid process target process PID 1552 set thread context of 828 1552 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe PID 1184 set thread context of 1384 1184 aqvu.exe aqvu.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\3FB84378-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
aqvu.exepid process 1384 aqvu.exe 1384 aqvu.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 828 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe Token: SeManageVolumePrivilege 816 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WinMail.exepid process 816 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WinMail.exepid process 816 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 816 WinMail.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exeaqvu.exeaqvu.exeexplorer.exedescription pid process target process PID 1552 wrote to memory of 828 1552 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe PID 1552 wrote to memory of 828 1552 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe PID 1552 wrote to memory of 828 1552 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe PID 1552 wrote to memory of 828 1552 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe PID 1552 wrote to memory of 828 1552 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe PID 1552 wrote to memory of 828 1552 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe PID 1552 wrote to memory of 828 1552 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe PID 1552 wrote to memory of 828 1552 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe PID 1552 wrote to memory of 828 1552 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe PID 1552 wrote to memory of 828 1552 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe PID 828 wrote to memory of 1184 828 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe aqvu.exe PID 828 wrote to memory of 1184 828 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe aqvu.exe PID 828 wrote to memory of 1184 828 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe aqvu.exe PID 828 wrote to memory of 1184 828 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe aqvu.exe PID 1184 wrote to memory of 1384 1184 aqvu.exe aqvu.exe PID 1184 wrote to memory of 1384 1184 aqvu.exe aqvu.exe PID 1184 wrote to memory of 1384 1184 aqvu.exe aqvu.exe PID 1184 wrote to memory of 1384 1184 aqvu.exe aqvu.exe PID 1184 wrote to memory of 1384 1184 aqvu.exe aqvu.exe PID 1184 wrote to memory of 1384 1184 aqvu.exe aqvu.exe PID 1184 wrote to memory of 1384 1184 aqvu.exe aqvu.exe PID 1184 wrote to memory of 1384 1184 aqvu.exe aqvu.exe PID 1184 wrote to memory of 1384 1184 aqvu.exe aqvu.exe PID 1184 wrote to memory of 1384 1184 aqvu.exe aqvu.exe PID 828 wrote to memory of 748 828 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe cmd.exe PID 828 wrote to memory of 748 828 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe cmd.exe PID 828 wrote to memory of 748 828 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe cmd.exe PID 828 wrote to memory of 748 828 2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe cmd.exe PID 1384 wrote to memory of 280 1384 aqvu.exe explorer.exe PID 1384 wrote to memory of 280 1384 aqvu.exe explorer.exe PID 1384 wrote to memory of 280 1384 aqvu.exe explorer.exe PID 1384 wrote to memory of 280 1384 aqvu.exe explorer.exe PID 1384 wrote to memory of 280 1384 aqvu.exe explorer.exe PID 1384 wrote to memory of 280 1384 aqvu.exe explorer.exe PID 1384 wrote to memory of 280 1384 aqvu.exe explorer.exe PID 1384 wrote to memory of 280 1384 aqvu.exe explorer.exe PID 1384 wrote to memory of 280 1384 aqvu.exe explorer.exe PID 1384 wrote to memory of 280 1384 aqvu.exe explorer.exe PID 1384 wrote to memory of 280 1384 aqvu.exe explorer.exe PID 280 wrote to memory of 1284 280 explorer.exe Explorer.EXE PID 280 wrote to memory of 1284 280 explorer.exe Explorer.EXE PID 280 wrote to memory of 1284 280 explorer.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe"C:\Users\Admin\AppData\Local\Temp\2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe"C:\Users\Admin\AppData\Local\Temp\2f9ca514375d3d060d375c500a948bf4d80e2d83b08c82cc4a33f532b77b67fe.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Roaming\Zyosda\aqvu.exe"C:\Users\Admin\AppData\Roaming\Zyosda\aqvu.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Roaming\Zyosda\aqvu.exe"C:\Users\Admin\AppData\Roaming\Zyosda\aqvu.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"6⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp12358190.bat"4⤵
- Deletes itself
PID:748
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD56f36b6e74ad1e928f0dbdf0ba89d862e
SHA153cba88552da3c36776dd71453563727a94f1813
SHA256928b744edb10473ebecff369b9ffa53305c9fdd0dff8ca294872b27b51e6f3e3
SHA51224204348bef2d6ccc1acc100362e56814e568f90011a5963fd78122effe0ba5205f2478de85a4c37cd8c6f3d9b7ff8b14ad888e76845df25e1d1ec635da33cf4
-
Filesize
270KB
MD53e44dfea42fb938c435dbf060b1ce96a
SHA18e5b5749ea26f48bd058db519173a205298f642e
SHA25650e5bcb0ddd09081fb6f31408790e6f24368b90ebd95c72bacf87885d4916ac9
SHA51234e82ec069ce3564d5ec6a0af902ca1286b5da66468c46ce92731b5e8e1d10f61d81fddc4c002e5c2c540bda496868477a6aeec3b0286c9aeab503f2adff1e73
-
Filesize
270KB
MD53e44dfea42fb938c435dbf060b1ce96a
SHA18e5b5749ea26f48bd058db519173a205298f642e
SHA25650e5bcb0ddd09081fb6f31408790e6f24368b90ebd95c72bacf87885d4916ac9
SHA51234e82ec069ce3564d5ec6a0af902ca1286b5da66468c46ce92731b5e8e1d10f61d81fddc4c002e5c2c540bda496868477a6aeec3b0286c9aeab503f2adff1e73
-
Filesize
270KB
MD53e44dfea42fb938c435dbf060b1ce96a
SHA18e5b5749ea26f48bd058db519173a205298f642e
SHA25650e5bcb0ddd09081fb6f31408790e6f24368b90ebd95c72bacf87885d4916ac9
SHA51234e82ec069ce3564d5ec6a0af902ca1286b5da66468c46ce92731b5e8e1d10f61d81fddc4c002e5c2c540bda496868477a6aeec3b0286c9aeab503f2adff1e73
-
Filesize
270KB
MD53e44dfea42fb938c435dbf060b1ce96a
SHA18e5b5749ea26f48bd058db519173a205298f642e
SHA25650e5bcb0ddd09081fb6f31408790e6f24368b90ebd95c72bacf87885d4916ac9
SHA51234e82ec069ce3564d5ec6a0af902ca1286b5da66468c46ce92731b5e8e1d10f61d81fddc4c002e5c2c540bda496868477a6aeec3b0286c9aeab503f2adff1e73
-
Filesize
270KB
MD53e44dfea42fb938c435dbf060b1ce96a
SHA18e5b5749ea26f48bd058db519173a205298f642e
SHA25650e5bcb0ddd09081fb6f31408790e6f24368b90ebd95c72bacf87885d4916ac9
SHA51234e82ec069ce3564d5ec6a0af902ca1286b5da66468c46ce92731b5e8e1d10f61d81fddc4c002e5c2c540bda496868477a6aeec3b0286c9aeab503f2adff1e73