Analysis
-
max time kernel
204s -
max time network
199s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 05:22
Static task
static1
Behavioral task
behavioral1
Sample
756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe
Resource
win10v2004-20221111-en
General
-
Target
756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe
-
Size
288KB
-
MD5
f53b47a30d06f7dad7b0c8bca5090561
-
SHA1
316cc7d23a93c64fad286dcad46bb6cc8bf6b497
-
SHA256
756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d
-
SHA512
4e06c32afda87a94fcdf9f44ad0dea7dcbb8df1cad11b6d5290ec97f1ae48d602abe7f7f112abb38a07164eca400536126a85bde4c287b85647dcb3e529711ac
-
SSDEEP
3072:5IwuPE5GCEGeDQ6zeNzagdBvlyRUYRjUQKhsh/wzDmmRbWCcI4NHcaCVEOuPB:5qukGeDPUdByR5lqsh43VRbUD
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
ymsa.exeymsa.exepid process 772 ymsa.exe 1264 ymsa.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 828 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exepid process 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ymsa.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\Currentversion\Run ymsa.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\{8703846B-BB88-6D58-B845-972E082ECF41} = "C:\\Users\\Admin\\AppData\\Roaming\\Zeecc\\ymsa.exe" ymsa.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exeymsa.exe756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exedescription pid process target process PID 2044 set thread context of 1988 2044 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe PID 772 set thread context of 1264 772 ymsa.exe ymsa.exe PID 1988 set thread context of 828 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe cmd.exe -
Processes:
756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Privacy 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\3FDE6C27-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
ymsa.exepid process 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe 1264 ymsa.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.execmd.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe Token: SeSecurityPrivilege 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe Token: SeSecurityPrivilege 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe Token: SeSecurityPrivilege 828 cmd.exe Token: SeSecurityPrivilege 828 cmd.exe Token: SeManageVolumePrivilege 868 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WinMail.exepid process 868 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WinMail.exepid process 868 WinMail.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exeymsa.exeWinMail.exepid process 2044 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe 772 ymsa.exe 868 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exeymsa.exeymsa.exedescription pid process target process PID 2044 wrote to memory of 1988 2044 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe PID 2044 wrote to memory of 1988 2044 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe PID 2044 wrote to memory of 1988 2044 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe PID 2044 wrote to memory of 1988 2044 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe PID 2044 wrote to memory of 1988 2044 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe PID 2044 wrote to memory of 1988 2044 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe PID 2044 wrote to memory of 1988 2044 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe PID 2044 wrote to memory of 1988 2044 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe PID 2044 wrote to memory of 1988 2044 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe PID 1988 wrote to memory of 772 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe ymsa.exe PID 1988 wrote to memory of 772 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe ymsa.exe PID 1988 wrote to memory of 772 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe ymsa.exe PID 1988 wrote to memory of 772 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe ymsa.exe PID 772 wrote to memory of 1264 772 ymsa.exe ymsa.exe PID 772 wrote to memory of 1264 772 ymsa.exe ymsa.exe PID 772 wrote to memory of 1264 772 ymsa.exe ymsa.exe PID 772 wrote to memory of 1264 772 ymsa.exe ymsa.exe PID 772 wrote to memory of 1264 772 ymsa.exe ymsa.exe PID 772 wrote to memory of 1264 772 ymsa.exe ymsa.exe PID 772 wrote to memory of 1264 772 ymsa.exe ymsa.exe PID 772 wrote to memory of 1264 772 ymsa.exe ymsa.exe PID 772 wrote to memory of 1264 772 ymsa.exe ymsa.exe PID 1264 wrote to memory of 1124 1264 ymsa.exe taskhost.exe PID 1264 wrote to memory of 1124 1264 ymsa.exe taskhost.exe PID 1264 wrote to memory of 1124 1264 ymsa.exe taskhost.exe PID 1264 wrote to memory of 1124 1264 ymsa.exe taskhost.exe PID 1264 wrote to memory of 1124 1264 ymsa.exe taskhost.exe PID 1264 wrote to memory of 1188 1264 ymsa.exe Dwm.exe PID 1264 wrote to memory of 1188 1264 ymsa.exe Dwm.exe PID 1264 wrote to memory of 1188 1264 ymsa.exe Dwm.exe PID 1264 wrote to memory of 1188 1264 ymsa.exe Dwm.exe PID 1264 wrote to memory of 1188 1264 ymsa.exe Dwm.exe PID 1264 wrote to memory of 1224 1264 ymsa.exe Explorer.EXE PID 1264 wrote to memory of 1224 1264 ymsa.exe Explorer.EXE PID 1264 wrote to memory of 1224 1264 ymsa.exe Explorer.EXE PID 1264 wrote to memory of 1224 1264 ymsa.exe Explorer.EXE PID 1264 wrote to memory of 1224 1264 ymsa.exe Explorer.EXE PID 1264 wrote to memory of 1988 1264 ymsa.exe 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe PID 1264 wrote to memory of 1988 1264 ymsa.exe 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe PID 1264 wrote to memory of 1988 1264 ymsa.exe 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe PID 1264 wrote to memory of 1988 1264 ymsa.exe 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe PID 1264 wrote to memory of 1988 1264 ymsa.exe 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe PID 1988 wrote to memory of 828 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe cmd.exe PID 1988 wrote to memory of 828 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe cmd.exe PID 1988 wrote to memory of 828 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe cmd.exe PID 1988 wrote to memory of 828 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe cmd.exe PID 1988 wrote to memory of 828 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe cmd.exe PID 1988 wrote to memory of 828 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe cmd.exe PID 1988 wrote to memory of 828 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe cmd.exe PID 1988 wrote to memory of 828 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe cmd.exe PID 1988 wrote to memory of 828 1988 756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe cmd.exe PID 1264 wrote to memory of 1440 1264 ymsa.exe conhost.exe PID 1264 wrote to memory of 1440 1264 ymsa.exe conhost.exe PID 1264 wrote to memory of 1440 1264 ymsa.exe conhost.exe PID 1264 wrote to memory of 1440 1264 ymsa.exe conhost.exe PID 1264 wrote to memory of 1440 1264 ymsa.exe conhost.exe PID 1264 wrote to memory of 868 1264 ymsa.exe WinMail.exe PID 1264 wrote to memory of 868 1264 ymsa.exe WinMail.exe PID 1264 wrote to memory of 868 1264 ymsa.exe WinMail.exe PID 1264 wrote to memory of 868 1264 ymsa.exe WinMail.exe PID 1264 wrote to memory of 868 1264 ymsa.exe WinMail.exe PID 1264 wrote to memory of 1616 1264 ymsa.exe DllHost.exe PID 1264 wrote to memory of 1616 1264 ymsa.exe DllHost.exe PID 1264 wrote to memory of 1616 1264 ymsa.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe"C:\Users\Admin\AppData\Local\Temp\756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe"C:\Users\Admin\AppData\Local\Temp\756444a61fc55e3e35b9f52fa4fba1bc8e7e77451745b643a0a12eb35b72fb4d.exe"3⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Roaming\Zeecc\ymsa.exe"C:\Users\Admin\AppData\Roaming\Zeecc\ymsa.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Roaming\Zeecc\ymsa.exe"C:\Users\Admin\AppData\Roaming\Zeecc\ymsa.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpfd9bc66a.bat"4⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:828
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-59692412517553327411145760937-10461819371498973835-1860809728-942872279573587585"1⤵PID:1440
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:868
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1616
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5c0f054c27c0d8247faf11fd2bb278c53
SHA1798bdc2793d0c009ee37b8bb2fb77a2aa4c5aae5
SHA2565f31d033bf6779594a8143b6396c8df10771c34978db0ec14f16f8c9809b328c
SHA512cf1116450ac6b55631122a9d17d7b20714fd34b89c711dad5e20836d96e5edd91e374c44b3f1381ae8db58c4ebb643891e6e6d9f18ebf24ea82499012e1198f0
-
Filesize
721B
MD54a8be24910a49dc62617c79095271182
SHA19852ae597d4666d8afacc1b973f132fb62351b34
SHA256ce1c10854e9d89abb2a1ffdc46ba3e59ad0012c4a30adeac01995aa826e66855
SHA5129c9794c3d74f436242ced1568f0dbf0a5cbb117a0221750930071e6bda81d621b593e5204e0d167e471938bea001d59aa5e3ac85c99140ebe2bbff1448f3209d
-
Filesize
721B
MD54a8be24910a49dc62617c79095271182
SHA19852ae597d4666d8afacc1b973f132fb62351b34
SHA256ce1c10854e9d89abb2a1ffdc46ba3e59ad0012c4a30adeac01995aa826e66855
SHA5129c9794c3d74f436242ced1568f0dbf0a5cbb117a0221750930071e6bda81d621b593e5204e0d167e471938bea001d59aa5e3ac85c99140ebe2bbff1448f3209d
-
Filesize
288KB
MD5d5729a4b0cd54287cc939876723538dc
SHA1b8de4ab43a1f829044c1b64b22df59d647362bb0
SHA256d9c72f6e417bb3b98b0422656a7a07ce7934c7baca61c86acb95552d80ffc015
SHA51205c6b8e1c0bd845b453083511084c1c6498a320c657f84586244040f420abd1f9a51e21d5242294642cef9abb289e86b8e69cde5bbe7d6e2bcf6bb5c60eed852
-
Filesize
288KB
MD5d5729a4b0cd54287cc939876723538dc
SHA1b8de4ab43a1f829044c1b64b22df59d647362bb0
SHA256d9c72f6e417bb3b98b0422656a7a07ce7934c7baca61c86acb95552d80ffc015
SHA51205c6b8e1c0bd845b453083511084c1c6498a320c657f84586244040f420abd1f9a51e21d5242294642cef9abb289e86b8e69cde5bbe7d6e2bcf6bb5c60eed852
-
Filesize
288KB
MD5d5729a4b0cd54287cc939876723538dc
SHA1b8de4ab43a1f829044c1b64b22df59d647362bb0
SHA256d9c72f6e417bb3b98b0422656a7a07ce7934c7baca61c86acb95552d80ffc015
SHA51205c6b8e1c0bd845b453083511084c1c6498a320c657f84586244040f420abd1f9a51e21d5242294642cef9abb289e86b8e69cde5bbe7d6e2bcf6bb5c60eed852
-
Filesize
288KB
MD5d5729a4b0cd54287cc939876723538dc
SHA1b8de4ab43a1f829044c1b64b22df59d647362bb0
SHA256d9c72f6e417bb3b98b0422656a7a07ce7934c7baca61c86acb95552d80ffc015
SHA51205c6b8e1c0bd845b453083511084c1c6498a320c657f84586244040f420abd1f9a51e21d5242294642cef9abb289e86b8e69cde5bbe7d6e2bcf6bb5c60eed852
-
Filesize
288KB
MD5d5729a4b0cd54287cc939876723538dc
SHA1b8de4ab43a1f829044c1b64b22df59d647362bb0
SHA256d9c72f6e417bb3b98b0422656a7a07ce7934c7baca61c86acb95552d80ffc015
SHA51205c6b8e1c0bd845b453083511084c1c6498a320c657f84586244040f420abd1f9a51e21d5242294642cef9abb289e86b8e69cde5bbe7d6e2bcf6bb5c60eed852