Analysis
-
max time kernel
250s -
max time network
343s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:17
Static task
static1
Behavioral task
behavioral1
Sample
3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe
Resource
win10v2004-20221111-en
General
-
Target
3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe
-
Size
310KB
-
MD5
4e16f3c39ec491402cf455e96144c580
-
SHA1
7cd58b772bda2d3691d5e4cce75f47301ca968bf
-
SHA256
3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060
-
SHA512
22662ff313949d8e63df04f49ec35180dd21a0b472e20f22055dae9e9c7755140d271f1a9be96e63be001c123a0a542b96597c93c7a89353a38ad71162f03854
-
SSDEEP
6144:jObgMHaMXcvfB2uue87LpH0NHyMd9RGX/zPTKVgIx:jEdcXN27lH0NSMd9gXaJx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ogol.exepid process 760 ogol.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 680 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exepid process 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ogol.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run ogol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ogol = "C:\\Users\\Admin\\AppData\\Roaming\\Ygsy\\ogol.exe" ogol.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exedescription pid process target process PID 540 set thread context of 680 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
ogol.exepid process 760 ogol.exe 760 ogol.exe 760 ogol.exe 760 ogol.exe 760 ogol.exe 760 ogol.exe 760 ogol.exe 760 ogol.exe 760 ogol.exe 760 ogol.exe 760 ogol.exe 760 ogol.exe 760 ogol.exe 760 ogol.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exeogol.exedescription pid process target process PID 540 wrote to memory of 760 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe ogol.exe PID 540 wrote to memory of 760 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe ogol.exe PID 540 wrote to memory of 760 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe ogol.exe PID 540 wrote to memory of 760 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe ogol.exe PID 760 wrote to memory of 1120 760 ogol.exe taskhost.exe PID 760 wrote to memory of 1120 760 ogol.exe taskhost.exe PID 760 wrote to memory of 1120 760 ogol.exe taskhost.exe PID 760 wrote to memory of 1120 760 ogol.exe taskhost.exe PID 760 wrote to memory of 1120 760 ogol.exe taskhost.exe PID 760 wrote to memory of 1220 760 ogol.exe Dwm.exe PID 760 wrote to memory of 1220 760 ogol.exe Dwm.exe PID 760 wrote to memory of 1220 760 ogol.exe Dwm.exe PID 760 wrote to memory of 1220 760 ogol.exe Dwm.exe PID 760 wrote to memory of 1220 760 ogol.exe Dwm.exe PID 760 wrote to memory of 1268 760 ogol.exe Explorer.EXE PID 760 wrote to memory of 1268 760 ogol.exe Explorer.EXE PID 760 wrote to memory of 1268 760 ogol.exe Explorer.EXE PID 760 wrote to memory of 1268 760 ogol.exe Explorer.EXE PID 760 wrote to memory of 1268 760 ogol.exe Explorer.EXE PID 760 wrote to memory of 540 760 ogol.exe 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe PID 760 wrote to memory of 540 760 ogol.exe 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe PID 760 wrote to memory of 540 760 ogol.exe 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe PID 760 wrote to memory of 540 760 ogol.exe 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe PID 760 wrote to memory of 540 760 ogol.exe 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe PID 540 wrote to memory of 680 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe cmd.exe PID 540 wrote to memory of 680 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe cmd.exe PID 540 wrote to memory of 680 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe cmd.exe PID 540 wrote to memory of 680 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe cmd.exe PID 540 wrote to memory of 680 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe cmd.exe PID 540 wrote to memory of 680 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe cmd.exe PID 540 wrote to memory of 680 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe cmd.exe PID 540 wrote to memory of 680 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe cmd.exe PID 540 wrote to memory of 680 540 3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe cmd.exe PID 760 wrote to memory of 1084 760 ogol.exe conhost.exe PID 760 wrote to memory of 1084 760 ogol.exe conhost.exe PID 760 wrote to memory of 1084 760 ogol.exe conhost.exe PID 760 wrote to memory of 1084 760 ogol.exe conhost.exe PID 760 wrote to memory of 1084 760 ogol.exe conhost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe"C:\Users\Admin\AppData\Local\Temp\3dc5db5a9d6fa078a6e790ac490c478ac024722ffbbcf906bffedebd10853060.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Roaming\Ygsy\ogol.exe"C:\Users\Admin\AppData\Roaming\Ygsy\ogol.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\PKJEC24.bat"3⤵
- Deletes itself
PID:680
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1220
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "14940505631944034461-119122327422666176-746627954-1186659599651802995481442006"1⤵PID:1084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD5838fb1ab8c00a1adfcdefb7788366595
SHA17bae45093155e65fc61fa229bda98f17d439cdb7
SHA256c7aca40fbe216dc055af1ad6d46c12157c03373dba74a3a2b4cbbdc63a083768
SHA51263d8597eac8b8858d05cca060607ff93fa538e96bf0ae3f65ca52be76a1466bed2be9f9662bafbed18fe9ffbbebffb632776d69b36e35831efd491896f0257e9
-
Filesize
310KB
MD5964e7efe032714b7166a27baa7162b35
SHA1b30637e50752d713232cf8a8c0bacf0afc02028b
SHA256d2c448f11a0a69735028cb624a0ff9f897413f49cad21b2044f0eee7841f8208
SHA5126b24dba6d823e815bac72399c9e537d58ce0c1f5c337dda4df0453dce55db7b087309bb138ade2bd86c872fc6107dc37023f4b22f8942ea14c647c74cd651971
-
Filesize
310KB
MD5964e7efe032714b7166a27baa7162b35
SHA1b30637e50752d713232cf8a8c0bacf0afc02028b
SHA256d2c448f11a0a69735028cb624a0ff9f897413f49cad21b2044f0eee7841f8208
SHA5126b24dba6d823e815bac72399c9e537d58ce0c1f5c337dda4df0453dce55db7b087309bb138ade2bd86c872fc6107dc37023f4b22f8942ea14c647c74cd651971
-
Filesize
310KB
MD5964e7efe032714b7166a27baa7162b35
SHA1b30637e50752d713232cf8a8c0bacf0afc02028b
SHA256d2c448f11a0a69735028cb624a0ff9f897413f49cad21b2044f0eee7841f8208
SHA5126b24dba6d823e815bac72399c9e537d58ce0c1f5c337dda4df0453dce55db7b087309bb138ade2bd86c872fc6107dc37023f4b22f8942ea14c647c74cd651971
-
Filesize
310KB
MD5964e7efe032714b7166a27baa7162b35
SHA1b30637e50752d713232cf8a8c0bacf0afc02028b
SHA256d2c448f11a0a69735028cb624a0ff9f897413f49cad21b2044f0eee7841f8208
SHA5126b24dba6d823e815bac72399c9e537d58ce0c1f5c337dda4df0453dce55db7b087309bb138ade2bd86c872fc6107dc37023f4b22f8942ea14c647c74cd651971