Analysis
-
max time kernel
251s -
max time network
362s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 09:14
Static task
static1
Behavioral task
behavioral1
Sample
9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe
Resource
win10v2004-20220812-en
General
-
Target
9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe
-
Size
585KB
-
MD5
db1b2bff6a8f8a2705e9c19f1410659a
-
SHA1
b9463c65d7e27f044cad8cfeb8093117ea5e5ced
-
SHA256
9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da
-
SHA512
c08b0adcb45d263bcefe5ce430f3d14a21a1f5e9997248ebe6daf966b1e39017cf93ef54a0b35015233cbf81157e5a0f74de6bf8639fcab180de58e592c9c4a1
-
SSDEEP
12288:+UGbKWcwK60aqeSdVTTYy1xCIkc+LEiSQ/z13eD3eV:KbKzwK60aMVHYy1xJkcPiSQb1SS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
mupy.exemupy.EXEpid process 696 mupy.exe 1340 mupy.EXE -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1792 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXEpid process 780 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE 780 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
mupy.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\Currentversion\Run mupy.EXE Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\Currentversion\Run mupy.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fagorylaow = "C:\\Users\\Admin\\AppData\\Roaming\\Muwu\\mupy.exe" mupy.EXE -
Suspicious use of SetThreadContext 2 IoCs
Processes:
9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exemupy.exedescription pid process target process PID 1144 set thread context of 780 1144 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE PID 696 set thread context of 1340 696 mupy.exe mupy.EXE -
Processes:
9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Privacy 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
mupy.EXEpid process 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE 1340 mupy.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXEdescription pid process Token: SeSecurityPrivilege 780 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE Token: SeSecurityPrivilege 780 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exemupy.exepid process 1144 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe 696 mupy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXEmupy.exemupy.EXEdescription pid process target process PID 1144 wrote to memory of 780 1144 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE PID 1144 wrote to memory of 780 1144 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE PID 1144 wrote to memory of 780 1144 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE PID 1144 wrote to memory of 780 1144 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE PID 1144 wrote to memory of 780 1144 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE PID 1144 wrote to memory of 780 1144 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE PID 1144 wrote to memory of 780 1144 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE PID 1144 wrote to memory of 780 1144 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE PID 1144 wrote to memory of 780 1144 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE PID 780 wrote to memory of 696 780 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE mupy.exe PID 780 wrote to memory of 696 780 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE mupy.exe PID 780 wrote to memory of 696 780 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE mupy.exe PID 780 wrote to memory of 696 780 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE mupy.exe PID 696 wrote to memory of 1340 696 mupy.exe mupy.EXE PID 696 wrote to memory of 1340 696 mupy.exe mupy.EXE PID 696 wrote to memory of 1340 696 mupy.exe mupy.EXE PID 696 wrote to memory of 1340 696 mupy.exe mupy.EXE PID 696 wrote to memory of 1340 696 mupy.exe mupy.EXE PID 696 wrote to memory of 1340 696 mupy.exe mupy.EXE PID 696 wrote to memory of 1340 696 mupy.exe mupy.EXE PID 696 wrote to memory of 1340 696 mupy.exe mupy.EXE PID 696 wrote to memory of 1340 696 mupy.exe mupy.EXE PID 1340 wrote to memory of 1152 1340 mupy.EXE taskhost.exe PID 1340 wrote to memory of 1152 1340 mupy.EXE taskhost.exe PID 1340 wrote to memory of 1152 1340 mupy.EXE taskhost.exe PID 1340 wrote to memory of 1152 1340 mupy.EXE taskhost.exe PID 1340 wrote to memory of 1152 1340 mupy.EXE taskhost.exe PID 1340 wrote to memory of 1252 1340 mupy.EXE Dwm.exe PID 1340 wrote to memory of 1252 1340 mupy.EXE Dwm.exe PID 1340 wrote to memory of 1252 1340 mupy.EXE Dwm.exe PID 1340 wrote to memory of 1252 1340 mupy.EXE Dwm.exe PID 1340 wrote to memory of 1252 1340 mupy.EXE Dwm.exe PID 1340 wrote to memory of 1312 1340 mupy.EXE Explorer.EXE PID 1340 wrote to memory of 1312 1340 mupy.EXE Explorer.EXE PID 1340 wrote to memory of 1312 1340 mupy.EXE Explorer.EXE PID 1340 wrote to memory of 1312 1340 mupy.EXE Explorer.EXE PID 1340 wrote to memory of 1312 1340 mupy.EXE Explorer.EXE PID 1340 wrote to memory of 780 1340 mupy.EXE 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE PID 1340 wrote to memory of 780 1340 mupy.EXE 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE PID 1340 wrote to memory of 780 1340 mupy.EXE 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE PID 1340 wrote to memory of 780 1340 mupy.EXE 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE PID 1340 wrote to memory of 780 1340 mupy.EXE 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE PID 780 wrote to memory of 1792 780 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE cmd.exe PID 780 wrote to memory of 1792 780 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE cmd.exe PID 780 wrote to memory of 1792 780 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE cmd.exe PID 780 wrote to memory of 1792 780 9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE cmd.exe PID 1340 wrote to memory of 1792 1340 mupy.EXE cmd.exe PID 1340 wrote to memory of 672 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 672 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 672 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 672 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 672 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 2008 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 2008 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 2008 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 2008 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 2008 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 1660 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 1660 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 1660 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 1660 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 1660 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 1612 1340 mupy.EXE DllHost.exe PID 1340 wrote to memory of 1612 1340 mupy.EXE DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe"C:\Users\Admin\AppData\Local\Temp\9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE"C:\Users\Admin\AppData\Local\Temp\9394f0dd862575ee8d12e309dc780e0369088cd4d36205445c3bd272471d78da.EXE"2⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Muwu\mupy.exe"C:\Users\Admin\AppData\Roaming\Muwu\mupy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Muwu\mupy.EXE"C:\Users\Admin\AppData\Roaming\Muwu\mupy.EXE"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpff24fff6.bat"3⤵
- Deletes itself
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpff24fff6.batFilesize
307B
MD53e150d892b97855b29783bf36778b18e
SHA1b368efa99b3848086b447b766dc0631cc8b09a4e
SHA256cd41cc9e1204e29befa0bfa89291a90811352a0a5a3d7a09657583db4a5ff792
SHA51201799fb2510eacd3657518ea3f972899c03043c5bc15d24358d05d12ca99bfc0d031256035d9a29b998dcf517a258f9b06ff2db2c810712416cb7a0802541bf3
-
C:\Users\Admin\AppData\Roaming\Muwu\mupy.EXEFilesize
585KB
MD5c5010258c34088f90c89db5795716edb
SHA1e86a54c0926da15f8f41b362890cd7b6b83647a4
SHA256ed2de9163b01f786de4aec705fead3401c982b5cf936a8dfeae1f8e2aa1836aa
SHA512e91a6b11e45cb4ed7480619ad3e14cc50210b490b110010d3a3bcb2f4410fac51838b6c39b1903d3922b63ddc922abbb54c387fdd4dd3f0ec3efb814d6323a77
-
C:\Users\Admin\AppData\Roaming\Muwu\mupy.exeFilesize
585KB
MD5c5010258c34088f90c89db5795716edb
SHA1e86a54c0926da15f8f41b362890cd7b6b83647a4
SHA256ed2de9163b01f786de4aec705fead3401c982b5cf936a8dfeae1f8e2aa1836aa
SHA512e91a6b11e45cb4ed7480619ad3e14cc50210b490b110010d3a3bcb2f4410fac51838b6c39b1903d3922b63ddc922abbb54c387fdd4dd3f0ec3efb814d6323a77
-
C:\Users\Admin\AppData\Roaming\Muwu\mupy.exeFilesize
585KB
MD5c5010258c34088f90c89db5795716edb
SHA1e86a54c0926da15f8f41b362890cd7b6b83647a4
SHA256ed2de9163b01f786de4aec705fead3401c982b5cf936a8dfeae1f8e2aa1836aa
SHA512e91a6b11e45cb4ed7480619ad3e14cc50210b490b110010d3a3bcb2f4410fac51838b6c39b1903d3922b63ddc922abbb54c387fdd4dd3f0ec3efb814d6323a77
-
\Users\Admin\AppData\Roaming\Muwu\mupy.exeFilesize
585KB
MD5c5010258c34088f90c89db5795716edb
SHA1e86a54c0926da15f8f41b362890cd7b6b83647a4
SHA256ed2de9163b01f786de4aec705fead3401c982b5cf936a8dfeae1f8e2aa1836aa
SHA512e91a6b11e45cb4ed7480619ad3e14cc50210b490b110010d3a3bcb2f4410fac51838b6c39b1903d3922b63ddc922abbb54c387fdd4dd3f0ec3efb814d6323a77
-
\Users\Admin\AppData\Roaming\Muwu\mupy.exeFilesize
585KB
MD5c5010258c34088f90c89db5795716edb
SHA1e86a54c0926da15f8f41b362890cd7b6b83647a4
SHA256ed2de9163b01f786de4aec705fead3401c982b5cf936a8dfeae1f8e2aa1836aa
SHA512e91a6b11e45cb4ed7480619ad3e14cc50210b490b110010d3a3bcb2f4410fac51838b6c39b1903d3922b63ddc922abbb54c387fdd4dd3f0ec3efb814d6323a77
-
memory/696-69-0x0000000000000000-mapping.dmp
-
memory/780-118-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/780-130-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/780-63-0x000000000042B055-mapping.dmp
-
memory/780-65-0x0000000076201000-0x0000000076203000-memory.dmpFilesize
8KB
-
memory/780-62-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/780-73-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/780-60-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/780-57-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/780-59-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/780-228-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/780-227-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/780-66-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/780-132-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/780-111-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/780-128-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/780-126-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/780-124-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/780-122-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/780-120-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/780-56-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/780-115-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/780-113-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/780-107-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/780-108-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/780-109-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/780-110-0x0000000000300000-0x000000000033B000-memory.dmpFilesize
236KB
-
memory/1152-90-0x00000000004A0000-0x00000000004DB000-memory.dmpFilesize
236KB
-
memory/1152-92-0x00000000004A0000-0x00000000004DB000-memory.dmpFilesize
236KB
-
memory/1152-89-0x00000000004A0000-0x00000000004DB000-memory.dmpFilesize
236KB
-
memory/1152-91-0x00000000004A0000-0x00000000004DB000-memory.dmpFilesize
236KB
-
memory/1252-96-0x0000000000120000-0x000000000015B000-memory.dmpFilesize
236KB
-
memory/1252-97-0x0000000000120000-0x000000000015B000-memory.dmpFilesize
236KB
-
memory/1252-98-0x0000000000120000-0x000000000015B000-memory.dmpFilesize
236KB
-
memory/1252-95-0x0000000000120000-0x000000000015B000-memory.dmpFilesize
236KB
-
memory/1312-104-0x0000000002980000-0x00000000029BB000-memory.dmpFilesize
236KB
-
memory/1312-101-0x0000000002980000-0x00000000029BB000-memory.dmpFilesize
236KB
-
memory/1312-102-0x0000000002980000-0x00000000029BB000-memory.dmpFilesize
236KB
-
memory/1312-103-0x0000000002980000-0x00000000029BB000-memory.dmpFilesize
236KB
-
memory/1340-86-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/1340-82-0x000000000042B055-mapping.dmp
-
memory/1340-231-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/1792-225-0x0000000000000000-mapping.dmp