Analysis
-
max time kernel
91s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:34
Static task
static1
Behavioral task
behavioral1
Sample
ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe
Resource
win10v2004-20220901-en
General
-
Target
ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe
-
Size
305KB
-
MD5
380628f35467056cd5eedeef3188f01e
-
SHA1
bd6cfdc7949228f8fe2ad532521f159a526a123f
-
SHA256
ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2
-
SHA512
129204e3dc7798e61527f3739703cece7f99606d0d66c7ef499997094e2a29d574d0fa1f44fba9a49db2781ab5e6891d0ee5cc8cd97eaeaf815dd9c57a2d2ebf
-
SSDEEP
3072:EfjboxnOCPJTY3M+iduU0Git18SFTyCMZqyFyyubKW/oaT0WMAgbPeDzQH+vpFTI:ss5YmfC3kzGKWz9w+QHCPGMSUwOoUa
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
itysy.exeitysy.exepid process 4268 itysy.exe 4332 itysy.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exeitysy.exedescription pid process target process PID 4976 set thread context of 3088 4976 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe PID 4268 set thread context of 4332 4268 itysy.exe itysy.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exeitysy.exeitysy.exepid process 4976 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe 4976 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe 4976 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe 4976 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe 4268 itysy.exe 4268 itysy.exe 4268 itysy.exe 4268 itysy.exe 4332 itysy.exe 4332 itysy.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
itysy.exepid process 4332 itysy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exedescription pid process Token: SeSecurityPrivilege 3088 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exeec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exeitysy.exeitysy.exedescription pid process target process PID 4976 wrote to memory of 3088 4976 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe PID 4976 wrote to memory of 3088 4976 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe PID 4976 wrote to memory of 3088 4976 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe PID 4976 wrote to memory of 3088 4976 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe PID 4976 wrote to memory of 3088 4976 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe PID 4976 wrote to memory of 3088 4976 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe PID 4976 wrote to memory of 3088 4976 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe PID 4976 wrote to memory of 3088 4976 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe PID 4976 wrote to memory of 3088 4976 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe PID 3088 wrote to memory of 4268 3088 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe itysy.exe PID 3088 wrote to memory of 4268 3088 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe itysy.exe PID 3088 wrote to memory of 4268 3088 ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe itysy.exe PID 4268 wrote to memory of 4332 4268 itysy.exe itysy.exe PID 4268 wrote to memory of 4332 4268 itysy.exe itysy.exe PID 4268 wrote to memory of 4332 4268 itysy.exe itysy.exe PID 4268 wrote to memory of 4332 4268 itysy.exe itysy.exe PID 4268 wrote to memory of 4332 4268 itysy.exe itysy.exe PID 4268 wrote to memory of 4332 4268 itysy.exe itysy.exe PID 4268 wrote to memory of 4332 4268 itysy.exe itysy.exe PID 4268 wrote to memory of 4332 4268 itysy.exe itysy.exe PID 4268 wrote to memory of 4332 4268 itysy.exe itysy.exe PID 4332 wrote to memory of 1828 4332 itysy.exe explorer.exe PID 4332 wrote to memory of 1828 4332 itysy.exe explorer.exe PID 4332 wrote to memory of 1828 4332 itysy.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe"C:\Users\Admin\AppData\Local\Temp\ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe"C:\Users\Admin\AppData\Local\Temp\ec8fb53f340f4b82ed5d857cd65d5a647f1f7038b723def2669277e641dbdce2.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Roaming\Afebw\itysy.exe"C:\Users\Admin\AppData\Roaming\Afebw\itysy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Roaming\Afebw\itysy.exe"C:\Users\Admin\AppData\Roaming\Afebw\itysy.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵PID:1828
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305KB
MD54c7be982b4a2732f1ff387e8bca21a27
SHA11b72d02fa6e8d7f64dcf6ff3c79d9407523d3cca
SHA2565cbca92a4548f9a8ba6cae22fdf202c40fb4cd2ae6534189fc788dbd7cb5f263
SHA5128ec44b167877d7a862fcb35ac9cd0b821de351a242593006833201f21fe1e5c7283c3377373499605e43d49c786eb9cf4e4b742e8f7979f3b98556aa1d3432be
-
Filesize
305KB
MD54c7be982b4a2732f1ff387e8bca21a27
SHA11b72d02fa6e8d7f64dcf6ff3c79d9407523d3cca
SHA2565cbca92a4548f9a8ba6cae22fdf202c40fb4cd2ae6534189fc788dbd7cb5f263
SHA5128ec44b167877d7a862fcb35ac9cd0b821de351a242593006833201f21fe1e5c7283c3377373499605e43d49c786eb9cf4e4b742e8f7979f3b98556aa1d3432be
-
Filesize
305KB
MD54c7be982b4a2732f1ff387e8bca21a27
SHA11b72d02fa6e8d7f64dcf6ff3c79d9407523d3cca
SHA2565cbca92a4548f9a8ba6cae22fdf202c40fb4cd2ae6534189fc788dbd7cb5f263
SHA5128ec44b167877d7a862fcb35ac9cd0b821de351a242593006833201f21fe1e5c7283c3377373499605e43d49c786eb9cf4e4b742e8f7979f3b98556aa1d3432be