Analysis

  • max time kernel
    188s
  • max time network
    227s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:54

General

  • Target

    ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe

  • Size

    268KB

  • MD5

    81ee65b94a361f37c560b8c1a57f502b

  • SHA1

    27ad2f307bc46c4c210bc1f9218cd2625c3bb1be

  • SHA256

    ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f

  • SHA512

    84b6f4cc675e2eabcfcf36d1b0be0e25ccb14c579d2ea27d9427dd755e5f19508e1962dddade62c66ca3016270b2e2ce4de4a45fc783e30ad7babe7efd0c562a

  • SSDEEP

    6144:2Ph8UWCp6ygCsTHzrrp3zMvEuFsSgnJE90/dtRl8Fl:2PVgC6lDMEuF3OEC/dtRlCl

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1296
      • C:\Users\Admin\AppData\Local\Temp\ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe
        "C:\Users\Admin\AppData\Local\Temp\ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1440
        • C:\Users\Admin\AppData\Local\Temp\ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe
          "C:\Users\Admin\AppData\Local\Temp\ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe"
          3⤵
            PID:1124
          • C:\Users\Admin\AppData\Local\Temp\ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe
            "C:\Users\Admin\AppData\Local\Temp\ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe"
            3⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:276
            • C:\Users\Admin\AppData\Local\Temp\Zijo\zesyd.exe
              "C:\Users\Admin\AppData\Local\Temp\Zijo\zesyd.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1772
              • C:\Users\Admin\AppData\Local\Temp\Zijo\zesyd.exe
                "C:\Users\Admin\AppData\Local\Temp\Zijo\zesyd.exe"
                5⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:1428
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YYP45F1.bat"
              4⤵
              • Deletes itself
              PID:1696
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1228
        • C:\Windows\system32\taskhost.exe
          "taskhost.exe"
          1⤵
            PID:1132

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\YYP45F1.bat

            Filesize

            282B

            MD5

            2c2a8b7b7d494d9168983349812fd338

            SHA1

            d0736dd36074664c776816c91f8e7d188c2a53f7

            SHA256

            5ef36fe20b372d96718a463bac0b0a0f5b2a7e4dd682284afc8c0ebf8f32da5c

            SHA512

            c0ac3b4582e496f97f2ccf7d731616afa7546a920e5c674e4526a51bc31763cead6f106fca3cfb3e681720829fd7f376a70cba5c868150fef13e4d1d469d0f3c

          • C:\Users\Admin\AppData\Local\Temp\Zijo\zesyd.exe

            Filesize

            268KB

            MD5

            3f1e73a8fd57f0ade816ba99bc85795f

            SHA1

            afad5df11666ed9d351ceedfb02b3c5bcd1c717d

            SHA256

            8002998b711b9aa3b8fd4b34706338fccb821d41a9a9c1894f07c393a80ea5af

            SHA512

            176624551dedfa81da796e02f8840ed14e85d2f4ca96540d281082368ca858d68d3f659cc478b0475560750a759d435ff94fb435258b39555ac97998920f4409

          • C:\Users\Admin\AppData\Local\Temp\Zijo\zesyd.exe

            Filesize

            268KB

            MD5

            3f1e73a8fd57f0ade816ba99bc85795f

            SHA1

            afad5df11666ed9d351ceedfb02b3c5bcd1c717d

            SHA256

            8002998b711b9aa3b8fd4b34706338fccb821d41a9a9c1894f07c393a80ea5af

            SHA512

            176624551dedfa81da796e02f8840ed14e85d2f4ca96540d281082368ca858d68d3f659cc478b0475560750a759d435ff94fb435258b39555ac97998920f4409

          • C:\Users\Admin\AppData\Local\Temp\Zijo\zesyd.exe

            Filesize

            268KB

            MD5

            3f1e73a8fd57f0ade816ba99bc85795f

            SHA1

            afad5df11666ed9d351ceedfb02b3c5bcd1c717d

            SHA256

            8002998b711b9aa3b8fd4b34706338fccb821d41a9a9c1894f07c393a80ea5af

            SHA512

            176624551dedfa81da796e02f8840ed14e85d2f4ca96540d281082368ca858d68d3f659cc478b0475560750a759d435ff94fb435258b39555ac97998920f4409

          • \Users\Admin\AppData\Local\Temp\Zijo\zesyd.exe

            Filesize

            268KB

            MD5

            3f1e73a8fd57f0ade816ba99bc85795f

            SHA1

            afad5df11666ed9d351ceedfb02b3c5bcd1c717d

            SHA256

            8002998b711b9aa3b8fd4b34706338fccb821d41a9a9c1894f07c393a80ea5af

            SHA512

            176624551dedfa81da796e02f8840ed14e85d2f4ca96540d281082368ca858d68d3f659cc478b0475560750a759d435ff94fb435258b39555ac97998920f4409

          • \Users\Admin\AppData\Local\Temp\Zijo\zesyd.exe

            Filesize

            268KB

            MD5

            3f1e73a8fd57f0ade816ba99bc85795f

            SHA1

            afad5df11666ed9d351ceedfb02b3c5bcd1c717d

            SHA256

            8002998b711b9aa3b8fd4b34706338fccb821d41a9a9c1894f07c393a80ea5af

            SHA512

            176624551dedfa81da796e02f8840ed14e85d2f4ca96540d281082368ca858d68d3f659cc478b0475560750a759d435ff94fb435258b39555ac97998920f4409

          • memory/276-67-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/276-55-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/276-56-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/276-94-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/276-68-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/276-69-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/276-70-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/276-64-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/276-63-0x000000000022472E-mapping.dmp

          • memory/276-58-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/276-61-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/276-59-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/1132-101-0x0000000001EE0000-0x0000000001F22000-memory.dmp

            Filesize

            264KB

          • memory/1132-99-0x0000000001EE0000-0x0000000001F22000-memory.dmp

            Filesize

            264KB

          • memory/1132-100-0x0000000001EE0000-0x0000000001F22000-memory.dmp

            Filesize

            264KB

          • memory/1132-102-0x0000000001EE0000-0x0000000001F22000-memory.dmp

            Filesize

            264KB

          • memory/1228-107-0x0000000001C50000-0x0000000001C92000-memory.dmp

            Filesize

            264KB

          • memory/1228-108-0x0000000001C50000-0x0000000001C92000-memory.dmp

            Filesize

            264KB

          • memory/1228-106-0x0000000001C50000-0x0000000001C92000-memory.dmp

            Filesize

            264KB

          • memory/1228-105-0x0000000001C50000-0x0000000001C92000-memory.dmp

            Filesize

            264KB

          • memory/1296-111-0x0000000002650000-0x0000000002692000-memory.dmp

            Filesize

            264KB

          • memory/1296-112-0x0000000002650000-0x0000000002692000-memory.dmp

            Filesize

            264KB

          • memory/1296-114-0x0000000002650000-0x0000000002692000-memory.dmp

            Filesize

            264KB

          • memory/1296-113-0x0000000002650000-0x0000000002692000-memory.dmp

            Filesize

            264KB

          • memory/1428-93-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/1428-86-0x000000000117472E-mapping.dmp

          • memory/1440-71-0x0000000074CB0000-0x000000007525B000-memory.dmp

            Filesize

            5.7MB

          • memory/1440-54-0x0000000075BA1000-0x0000000075BA3000-memory.dmp

            Filesize

            8KB

          • memory/1440-65-0x0000000074CB0000-0x000000007525B000-memory.dmp

            Filesize

            5.7MB

          • memory/1696-95-0x0000000000000000-mapping.dmp

          • memory/1772-92-0x000000000085A000-0x000000000085D000-memory.dmp

            Filesize

            12KB

          • memory/1772-91-0x0000000074990000-0x0000000074F3B000-memory.dmp

            Filesize

            5.7MB

          • memory/1772-73-0x0000000000000000-mapping.dmp