Analysis

  • max time kernel
    249s
  • max time network
    333s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 10:00

General

  • Target

    aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe

  • Size

    138KB

  • MD5

    1ca5e9c142ee9b5976d6a7008256997b

  • SHA1

    f3d79ad4997fbe954fef88f7bf28b40d4bdff45f

  • SHA256

    aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61

  • SHA512

    720be60ed91e1f0de202759b9819a6ddfd47a55c36cc283ff62f29f85bf3b7e1905d0891fb291a768755965add76b39b962a2a7a0a552c290e80de28146081ff

  • SSDEEP

    3072:KT3x50VJqtHGbu5XCniylWrtGA1GHvGXaCH1Fukp1a4r3wQGY:KT3oGtmiYlW4A1QvGXjBaVQGY

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe
        "C:\Users\Admin\AppData\Local\Temp\aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:368
        • C:\Users\Admin\AppData\Roaming\Uqoce\zylue.exe
          "C:\Users\Admin\AppData\Roaming\Uqoce\zylue.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1472
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpcf55cd7b.bat"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1652
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1168
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1116
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "1245412661-920732166-1583437933-54198107036280316119317219351627064638350812508"
          1⤵
            PID:1984
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:1796
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
                PID:1536
              • C:\Program Files\Windows Mail\WinMail.exe
                "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:752

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Roaming\Kydiy\myogo.qea

                Filesize

                398B

                MD5

                0c3bfbca3cfa0f28200b479401727dfa

                SHA1

                80414a1b9fff756ab8e66f5e4216e6a671d44196

                SHA256

                051743ef5e95837ee8b71dec2d0750da0c60f216fd658c278a1d0a393a8427ac

                SHA512

                8d53a9d68b1879ba0331fdcf0244884abde7a88ff7db96d969b4fabe96c8786d6b0fd9c9ca987aa3439398d04ca4ea6d39ba59cf9dceb956dcaae1cb132227d7

              • C:\Users\Admin\AppData\Roaming\Uqoce\zylue.exe

                Filesize

                138KB

                MD5

                d0a6f5c01bd96d266174c4302e776c35

                SHA1

                93cdbaf7e4a2d9b64607e82f09bad542d078d374

                SHA256

                d730a56c42c8321a5233ef2d609ae6ab8f33f4531cb38bff9831486104bc97c2

                SHA512

                d4f246521cee3fb0e6781c5fd2a219af161b30d3e4451feda0f5eeea55c561af94a9be3723761aebd6cda8d21eb4b4ffead775a3928c2f503eed5bb6e4dc9d75

              • C:\Users\Admin\AppData\Roaming\Uqoce\zylue.exe

                Filesize

                138KB

                MD5

                d0a6f5c01bd96d266174c4302e776c35

                SHA1

                93cdbaf7e4a2d9b64607e82f09bad542d078d374

                SHA256

                d730a56c42c8321a5233ef2d609ae6ab8f33f4531cb38bff9831486104bc97c2

                SHA512

                d4f246521cee3fb0e6781c5fd2a219af161b30d3e4451feda0f5eeea55c561af94a9be3723761aebd6cda8d21eb4b4ffead775a3928c2f503eed5bb6e4dc9d75

              • \Users\Admin\AppData\Roaming\Uqoce\zylue.exe

                Filesize

                138KB

                MD5

                d0a6f5c01bd96d266174c4302e776c35

                SHA1

                93cdbaf7e4a2d9b64607e82f09bad542d078d374

                SHA256

                d730a56c42c8321a5233ef2d609ae6ab8f33f4531cb38bff9831486104bc97c2

                SHA512

                d4f246521cee3fb0e6781c5fd2a219af161b30d3e4451feda0f5eeea55c561af94a9be3723761aebd6cda8d21eb4b4ffead775a3928c2f503eed5bb6e4dc9d75

              • \Users\Admin\AppData\Roaming\Uqoce\zylue.exe

                Filesize

                138KB

                MD5

                d0a6f5c01bd96d266174c4302e776c35

                SHA1

                93cdbaf7e4a2d9b64607e82f09bad542d078d374

                SHA256

                d730a56c42c8321a5233ef2d609ae6ab8f33f4531cb38bff9831486104bc97c2

                SHA512

                d4f246521cee3fb0e6781c5fd2a219af161b30d3e4451feda0f5eeea55c561af94a9be3723761aebd6cda8d21eb4b4ffead775a3928c2f503eed5bb6e4dc9d75

              • memory/368-54-0x0000000075531000-0x0000000075533000-memory.dmp

                Filesize

                8KB

              • memory/368-83-0x0000000000430000-0x0000000000457000-memory.dmp

                Filesize

                156KB

              • memory/368-82-0x0000000000430000-0x0000000000457000-memory.dmp

                Filesize

                156KB

              • memory/368-81-0x0000000000430000-0x0000000000457000-memory.dmp

                Filesize

                156KB

              • memory/368-84-0x0000000000430000-0x0000000000457000-memory.dmp

                Filesize

                156KB

              • memory/368-85-0x0000000000430000-0x0000000000457000-memory.dmp

                Filesize

                156KB

              • memory/368-86-0x0000000000430000-0x0000000000457000-memory.dmp

                Filesize

                156KB

              • memory/752-118-0x0000000001F80000-0x0000000001F90000-memory.dmp

                Filesize

                64KB

              • memory/752-117-0x000007FEF5BC1000-0x000007FEF5BC3000-memory.dmp

                Filesize

                8KB

              • memory/752-116-0x000007FEFBCE1000-0x000007FEFBCE3000-memory.dmp

                Filesize

                8KB

              • memory/752-124-0x0000000002180000-0x0000000002190000-memory.dmp

                Filesize

                64KB

              • memory/1116-66-0x0000000001CB0000-0x0000000001CD7000-memory.dmp

                Filesize

                156KB

              • memory/1116-65-0x0000000001CB0000-0x0000000001CD7000-memory.dmp

                Filesize

                156KB

              • memory/1116-64-0x0000000001CB0000-0x0000000001CD7000-memory.dmp

                Filesize

                156KB

              • memory/1116-63-0x0000000001CB0000-0x0000000001CD7000-memory.dmp

                Filesize

                156KB

              • memory/1116-61-0x0000000001CB0000-0x0000000001CD7000-memory.dmp

                Filesize

                156KB

              • memory/1168-70-0x0000000000150000-0x0000000000177000-memory.dmp

                Filesize

                156KB

              • memory/1168-69-0x0000000000150000-0x0000000000177000-memory.dmp

                Filesize

                156KB

              • memory/1168-71-0x0000000000150000-0x0000000000177000-memory.dmp

                Filesize

                156KB

              • memory/1168-72-0x0000000000150000-0x0000000000177000-memory.dmp

                Filesize

                156KB

              • memory/1216-77-0x0000000002900000-0x0000000002927000-memory.dmp

                Filesize

                156KB

              • memory/1216-76-0x0000000002900000-0x0000000002927000-memory.dmp

                Filesize

                156KB

              • memory/1216-78-0x0000000002900000-0x0000000002927000-memory.dmp

                Filesize

                156KB

              • memory/1216-75-0x0000000002900000-0x0000000002927000-memory.dmp

                Filesize

                156KB

              • memory/1472-57-0x0000000000000000-mapping.dmp

              • memory/1536-112-0x00000000025A0000-0x00000000025C7000-memory.dmp

                Filesize

                156KB

              • memory/1536-115-0x00000000025A0000-0x00000000025C7000-memory.dmp

                Filesize

                156KB

              • memory/1536-114-0x00000000025A0000-0x00000000025C7000-memory.dmp

                Filesize

                156KB

              • memory/1536-113-0x00000000025A0000-0x00000000025C7000-memory.dmp

                Filesize

                156KB

              • memory/1652-93-0x0000000000050000-0x0000000000077000-memory.dmp

                Filesize

                156KB

              • memory/1652-95-0x0000000000062CBA-mapping.dmp

              • memory/1652-89-0x0000000000050000-0x0000000000077000-memory.dmp

                Filesize

                156KB

              • memory/1652-92-0x0000000000050000-0x0000000000077000-memory.dmp

                Filesize

                156KB

              • memory/1652-103-0x0000000000050000-0x0000000000077000-memory.dmp

                Filesize

                156KB

              • memory/1652-91-0x0000000000050000-0x0000000000077000-memory.dmp

                Filesize

                156KB

              • memory/1796-108-0x0000000000310000-0x0000000000337000-memory.dmp

                Filesize

                156KB

              • memory/1796-109-0x0000000000310000-0x0000000000337000-memory.dmp

                Filesize

                156KB

              • memory/1796-107-0x0000000000310000-0x0000000000337000-memory.dmp

                Filesize

                156KB

              • memory/1796-106-0x0000000000310000-0x0000000000337000-memory.dmp

                Filesize

                156KB

              • memory/1984-101-0x0000000001B80000-0x0000000001BA7000-memory.dmp

                Filesize

                156KB

              • memory/1984-100-0x0000000001B80000-0x0000000001BA7000-memory.dmp

                Filesize

                156KB

              • memory/1984-99-0x0000000001B80000-0x0000000001BA7000-memory.dmp

                Filesize

                156KB

              • memory/1984-102-0x0000000001B80000-0x0000000001BA7000-memory.dmp

                Filesize

                156KB