Analysis
-
max time kernel
188s -
max time network
227s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:54
Static task
static1
Behavioral task
behavioral1
Sample
ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe
Resource
win10v2004-20220812-en
General
-
Target
ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe
-
Size
268KB
-
MD5
81ee65b94a361f37c560b8c1a57f502b
-
SHA1
27ad2f307bc46c4c210bc1f9218cd2625c3bb1be
-
SHA256
ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f
-
SHA512
84b6f4cc675e2eabcfcf36d1b0be0e25ccb14c579d2ea27d9427dd755e5f19508e1962dddade62c66ca3016270b2e2ce4de4a45fc783e30ad7babe7efd0c562a
-
SSDEEP
6144:2Ph8UWCp6ygCsTHzrrp3zMvEuFsSgnJE90/dtRl8Fl:2PVgC6lDMEuF3OEC/dtRlCl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
zesyd.exezesyd.exepid process 1772 zesyd.exe 1428 zesyd.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1696 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exezesyd.exepid process 276 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe 1772 zesyd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
zesyd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run zesyd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zesyd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Zijo\\zesyd.exe" zesyd.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exezesyd.exedescription pid process target process PID 1440 set thread context of 276 1440 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe PID 1772 set thread context of 1428 1772 zesyd.exe zesyd.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exezesyd.exepid process 276 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe 1428 zesyd.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.execcba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exezesyd.exezesyd.exedescription pid process target process PID 1440 wrote to memory of 1124 1440 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe PID 1440 wrote to memory of 1124 1440 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe PID 1440 wrote to memory of 1124 1440 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe PID 1440 wrote to memory of 1124 1440 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe PID 1440 wrote to memory of 276 1440 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe PID 1440 wrote to memory of 276 1440 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe PID 1440 wrote to memory of 276 1440 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe PID 1440 wrote to memory of 276 1440 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe PID 1440 wrote to memory of 276 1440 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe PID 1440 wrote to memory of 276 1440 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe PID 1440 wrote to memory of 276 1440 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe PID 1440 wrote to memory of 276 1440 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe PID 1440 wrote to memory of 276 1440 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe PID 1440 wrote to memory of 276 1440 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe PID 276 wrote to memory of 1772 276 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe zesyd.exe PID 276 wrote to memory of 1772 276 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe zesyd.exe PID 276 wrote to memory of 1772 276 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe zesyd.exe PID 276 wrote to memory of 1772 276 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe zesyd.exe PID 1772 wrote to memory of 1428 1772 zesyd.exe zesyd.exe PID 1772 wrote to memory of 1428 1772 zesyd.exe zesyd.exe PID 1772 wrote to memory of 1428 1772 zesyd.exe zesyd.exe PID 1772 wrote to memory of 1428 1772 zesyd.exe zesyd.exe PID 1772 wrote to memory of 1428 1772 zesyd.exe zesyd.exe PID 1772 wrote to memory of 1428 1772 zesyd.exe zesyd.exe PID 1772 wrote to memory of 1428 1772 zesyd.exe zesyd.exe PID 1772 wrote to memory of 1428 1772 zesyd.exe zesyd.exe PID 1772 wrote to memory of 1428 1772 zesyd.exe zesyd.exe PID 1772 wrote to memory of 1428 1772 zesyd.exe zesyd.exe PID 276 wrote to memory of 1696 276 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe cmd.exe PID 276 wrote to memory of 1696 276 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe cmd.exe PID 276 wrote to memory of 1696 276 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe cmd.exe PID 276 wrote to memory of 1696 276 ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe cmd.exe PID 1428 wrote to memory of 1132 1428 zesyd.exe taskhost.exe PID 1428 wrote to memory of 1132 1428 zesyd.exe taskhost.exe PID 1428 wrote to memory of 1132 1428 zesyd.exe taskhost.exe PID 1428 wrote to memory of 1132 1428 zesyd.exe taskhost.exe PID 1428 wrote to memory of 1132 1428 zesyd.exe taskhost.exe PID 1428 wrote to memory of 1228 1428 zesyd.exe Dwm.exe PID 1428 wrote to memory of 1228 1428 zesyd.exe Dwm.exe PID 1428 wrote to memory of 1228 1428 zesyd.exe Dwm.exe PID 1428 wrote to memory of 1228 1428 zesyd.exe Dwm.exe PID 1428 wrote to memory of 1228 1428 zesyd.exe Dwm.exe PID 1428 wrote to memory of 1296 1428 zesyd.exe Explorer.EXE PID 1428 wrote to memory of 1296 1428 zesyd.exe Explorer.EXE PID 1428 wrote to memory of 1296 1428 zesyd.exe Explorer.EXE PID 1428 wrote to memory of 1296 1428 zesyd.exe Explorer.EXE PID 1428 wrote to memory of 1296 1428 zesyd.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe"C:\Users\Admin\AppData\Local\Temp\ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe"C:\Users\Admin\AppData\Local\Temp\ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe"3⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe"C:\Users\Admin\AppData\Local\Temp\ccba12127834c43a3a78f4c1c22a3a5233dda08631dde762bf0ab3451eb4699f.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Users\Admin\AppData\Local\Temp\Zijo\zesyd.exe"C:\Users\Admin\AppData\Local\Temp\Zijo\zesyd.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\Zijo\zesyd.exe"C:\Users\Admin\AppData\Local\Temp\Zijo\zesyd.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YYP45F1.bat"4⤵
- Deletes itself
PID:1696
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1228
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282B
MD52c2a8b7b7d494d9168983349812fd338
SHA1d0736dd36074664c776816c91f8e7d188c2a53f7
SHA2565ef36fe20b372d96718a463bac0b0a0f5b2a7e4dd682284afc8c0ebf8f32da5c
SHA512c0ac3b4582e496f97f2ccf7d731616afa7546a920e5c674e4526a51bc31763cead6f106fca3cfb3e681720829fd7f376a70cba5c868150fef13e4d1d469d0f3c
-
Filesize
268KB
MD53f1e73a8fd57f0ade816ba99bc85795f
SHA1afad5df11666ed9d351ceedfb02b3c5bcd1c717d
SHA2568002998b711b9aa3b8fd4b34706338fccb821d41a9a9c1894f07c393a80ea5af
SHA512176624551dedfa81da796e02f8840ed14e85d2f4ca96540d281082368ca858d68d3f659cc478b0475560750a759d435ff94fb435258b39555ac97998920f4409
-
Filesize
268KB
MD53f1e73a8fd57f0ade816ba99bc85795f
SHA1afad5df11666ed9d351ceedfb02b3c5bcd1c717d
SHA2568002998b711b9aa3b8fd4b34706338fccb821d41a9a9c1894f07c393a80ea5af
SHA512176624551dedfa81da796e02f8840ed14e85d2f4ca96540d281082368ca858d68d3f659cc478b0475560750a759d435ff94fb435258b39555ac97998920f4409
-
Filesize
268KB
MD53f1e73a8fd57f0ade816ba99bc85795f
SHA1afad5df11666ed9d351ceedfb02b3c5bcd1c717d
SHA2568002998b711b9aa3b8fd4b34706338fccb821d41a9a9c1894f07c393a80ea5af
SHA512176624551dedfa81da796e02f8840ed14e85d2f4ca96540d281082368ca858d68d3f659cc478b0475560750a759d435ff94fb435258b39555ac97998920f4409
-
Filesize
268KB
MD53f1e73a8fd57f0ade816ba99bc85795f
SHA1afad5df11666ed9d351ceedfb02b3c5bcd1c717d
SHA2568002998b711b9aa3b8fd4b34706338fccb821d41a9a9c1894f07c393a80ea5af
SHA512176624551dedfa81da796e02f8840ed14e85d2f4ca96540d281082368ca858d68d3f659cc478b0475560750a759d435ff94fb435258b39555ac97998920f4409
-
Filesize
268KB
MD53f1e73a8fd57f0ade816ba99bc85795f
SHA1afad5df11666ed9d351ceedfb02b3c5bcd1c717d
SHA2568002998b711b9aa3b8fd4b34706338fccb821d41a9a9c1894f07c393a80ea5af
SHA512176624551dedfa81da796e02f8840ed14e85d2f4ca96540d281082368ca858d68d3f659cc478b0475560750a759d435ff94fb435258b39555ac97998920f4409