Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:04
Static task
static1
Behavioral task
behavioral1
Sample
2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe
Resource
win10v2004-20221111-en
General
-
Target
2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe
-
Size
350KB
-
MD5
4ac860f2dfe44d64c0a43b9a3cc38e40
-
SHA1
2085d9eec3602b1605a68356ab8167cb116bdee0
-
SHA256
2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5
-
SHA512
d69593a02ddb357fd2d5a302113a25d49df63971a1fbb483505ab7faee3e18e82a96d73c931278f549375b559409718d2a6ae0ff95d57d9dfaad11798042f7d9
-
SSDEEP
6144:P7W9jgZngovqAHaxOK6W6beumW+XGccIuZENT3rdp3N:PagZ7vwx2/NmDXkIhp3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
byiwz.exepid process 1776 byiwz.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 580 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exepid process 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
byiwz.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run byiwz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\{91C05068-4FEF-AD4D-7F1F-8FEC7D0BACF1} = "C:\\Users\\Admin\\AppData\\Roaming\\Nerali\\byiwz.exe" byiwz.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exedescription pid process target process PID 1184 set thread context of 580 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
byiwz.exepid process 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe 1776 byiwz.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exebyiwz.exepid process 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe 1776 byiwz.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exebyiwz.exedescription pid process target process PID 1184 wrote to memory of 1776 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe byiwz.exe PID 1184 wrote to memory of 1776 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe byiwz.exe PID 1184 wrote to memory of 1776 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe byiwz.exe PID 1184 wrote to memory of 1776 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe byiwz.exe PID 1776 wrote to memory of 1256 1776 byiwz.exe taskhost.exe PID 1776 wrote to memory of 1256 1776 byiwz.exe taskhost.exe PID 1776 wrote to memory of 1256 1776 byiwz.exe taskhost.exe PID 1776 wrote to memory of 1256 1776 byiwz.exe taskhost.exe PID 1776 wrote to memory of 1256 1776 byiwz.exe taskhost.exe PID 1776 wrote to memory of 1340 1776 byiwz.exe Dwm.exe PID 1776 wrote to memory of 1340 1776 byiwz.exe Dwm.exe PID 1776 wrote to memory of 1340 1776 byiwz.exe Dwm.exe PID 1776 wrote to memory of 1340 1776 byiwz.exe Dwm.exe PID 1776 wrote to memory of 1340 1776 byiwz.exe Dwm.exe PID 1776 wrote to memory of 1412 1776 byiwz.exe Explorer.EXE PID 1776 wrote to memory of 1412 1776 byiwz.exe Explorer.EXE PID 1776 wrote to memory of 1412 1776 byiwz.exe Explorer.EXE PID 1776 wrote to memory of 1412 1776 byiwz.exe Explorer.EXE PID 1776 wrote to memory of 1412 1776 byiwz.exe Explorer.EXE PID 1776 wrote to memory of 1184 1776 byiwz.exe 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe PID 1776 wrote to memory of 1184 1776 byiwz.exe 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe PID 1776 wrote to memory of 1184 1776 byiwz.exe 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe PID 1776 wrote to memory of 1184 1776 byiwz.exe 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe PID 1776 wrote to memory of 1184 1776 byiwz.exe 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe PID 1184 wrote to memory of 580 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe cmd.exe PID 1184 wrote to memory of 580 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe cmd.exe PID 1184 wrote to memory of 580 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe cmd.exe PID 1184 wrote to memory of 580 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe cmd.exe PID 1184 wrote to memory of 580 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe cmd.exe PID 1184 wrote to memory of 580 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe cmd.exe PID 1184 wrote to memory of 580 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe cmd.exe PID 1184 wrote to memory of 580 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe cmd.exe PID 1184 wrote to memory of 580 1184 2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe cmd.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1256
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe"C:\Users\Admin\AppData\Local\Temp\2b0aa26b6108793645b26f7d70d0fab28fac27e4c8bcb7252d2ee4e3480570c5.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Roaming\Nerali\byiwz.exe"C:\Users\Admin\AppData\Roaming\Nerali\byiwz.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpce1ac06b.bat"3⤵
- Deletes itself
PID:580
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5ee29868ebc028ef5ac90ed86419e6001
SHA14fc906694e3ab5aec8312ee003a8c6760956dd67
SHA25618173ccafc044d270fedf9c068a29a4b30e510dc6c15f08880e2a6bb6f43c961
SHA512133f6925d3e6759ca30f29c273a7bc015829b5429cd6ce0be204d3b4fdb9ebf536712e59e83eb70162f21baaaf11c1781f7a529d884b87df65a3b2aaa7419700
-
Filesize
350KB
MD5087b291d3c39e923841b5db0191b74a0
SHA1d11b6d1fec08d191ff69f185583a3a8806ca67f0
SHA25610cba07fdaf400da3560d822db797965781355bdf56e7196e8875d09dacd2c2f
SHA51240ff9547d1c1436403932f71e9b5746f141b38f514ac6ebb11bf58897f10143eaa5627e1b4ea75816d8ddca48c53fe94fdd8a25417481ce02a335d39a87032d1
-
Filesize
350KB
MD5087b291d3c39e923841b5db0191b74a0
SHA1d11b6d1fec08d191ff69f185583a3a8806ca67f0
SHA25610cba07fdaf400da3560d822db797965781355bdf56e7196e8875d09dacd2c2f
SHA51240ff9547d1c1436403932f71e9b5746f141b38f514ac6ebb11bf58897f10143eaa5627e1b4ea75816d8ddca48c53fe94fdd8a25417481ce02a335d39a87032d1
-
Filesize
350KB
MD5087b291d3c39e923841b5db0191b74a0
SHA1d11b6d1fec08d191ff69f185583a3a8806ca67f0
SHA25610cba07fdaf400da3560d822db797965781355bdf56e7196e8875d09dacd2c2f
SHA51240ff9547d1c1436403932f71e9b5746f141b38f514ac6ebb11bf58897f10143eaa5627e1b4ea75816d8ddca48c53fe94fdd8a25417481ce02a335d39a87032d1