Analysis
-
max time kernel
150s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe
Resource
win10v2004-20221111-en
General
-
Target
rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe
-
Size
176KB
-
MD5
13997ebf7af8d37dda6697ac03f76cc3
-
SHA1
9be2bcd498406bdfb05f860ad726273c4a7b4f3a
-
SHA256
11ecf58db103eb2ded5b942f303d48b5d77e336b8edfe335fa7b81264d1f50ef
-
SHA512
2894ef41ec784fb39ec663ff8ca5fa8c0ebbd875f95f6e2b843c8bca59d63cc7c43f64df43898290cef31c4b32478819f437fcc4656606d0f7cd4721c735ffee
-
SSDEEP
3072:rGwR1qmB1TQgHtMF5a6I4Ya5Tlrjmvl3XymSPTyAAwoc9+IkMd+zr3/1C:7KLa6I4x3mdnCNAwo42M
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2024 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ypbkryye.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Identities\\ypbkryye.exe\"" Explorer.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 328 set thread context of 1152 328 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 27 -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 328 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 1152 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 1152 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 1412 Explorer.EXE 1412 Explorer.EXE 1412 Explorer.EXE 1412 Explorer.EXE 1412 Explorer.EXE 1412 Explorer.EXE 1412 Explorer.EXE 1412 Explorer.EXE 1412 Explorer.EXE 1412 Explorer.EXE 1412 Explorer.EXE 1412 Explorer.EXE 1412 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1152 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe Token: SeDebugPrivilege 1412 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1412 Explorer.EXE 1412 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1412 Explorer.EXE 1412 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 328 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 328 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1412 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 328 wrote to memory of 1152 328 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 27 PID 328 wrote to memory of 1152 328 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 27 PID 328 wrote to memory of 1152 328 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 27 PID 328 wrote to memory of 1152 328 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 27 PID 328 wrote to memory of 1152 328 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 27 PID 328 wrote to memory of 1152 328 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 27 PID 328 wrote to memory of 1152 328 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 27 PID 328 wrote to memory of 1152 328 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 27 PID 328 wrote to memory of 1152 328 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 27 PID 328 wrote to memory of 1152 328 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 27 PID 1152 wrote to memory of 2024 1152 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 28 PID 1152 wrote to memory of 2024 1152 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 28 PID 1152 wrote to memory of 2024 1152 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 28 PID 1152 wrote to memory of 2024 1152 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 28 PID 1152 wrote to memory of 1412 1152 rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe 15 PID 1412 wrote to memory of 1260 1412 Explorer.EXE 17 PID 1412 wrote to memory of 1260 1412 Explorer.EXE 17 PID 1412 wrote to memory of 1336 1412 Explorer.EXE 16 PID 1412 wrote to memory of 2024 1412 Explorer.EXE 28 PID 1412 wrote to memory of 2024 1412 Explorer.EXE 28 PID 1412 wrote to memory of 2016 1412 Explorer.EXE 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe"C:\Users\Admin\AppData\Local\Temp\rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Local\Temp\rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exeC:\Users\Admin\AppData\Local\Temp\rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS7981~1.BAT"4⤵
- Deletes itself
PID:2024
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1336
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1260
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-163351683621330329862053060700-1521979429-1959676713-168701753410111669381152010898"1⤵PID:2016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD549335464bb1d1c6236ab459873dfa258
SHA12b7b177283d7aae1b1732512deb0a050cd209bef
SHA2564e884df3327dae1f4550958bd07e8211be2b819b8d4f263f67e6a0bbc15c545c
SHA5127b996eaab9220e49bae9461ef3d6e38123c798398439378645a69351339201747d6f5c425f70797b9ad30d2d1bcd712b5326e5e2bec703419d71bdfceca27620