Analysis
-
max time kernel
249s -
max time network
333s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 10:00
Static task
static1
Behavioral task
behavioral1
Sample
aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe
Resource
win10v2004-20220812-en
General
-
Target
aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe
-
Size
138KB
-
MD5
1ca5e9c142ee9b5976d6a7008256997b
-
SHA1
f3d79ad4997fbe954fef88f7bf28b40d4bdff45f
-
SHA256
aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61
-
SHA512
720be60ed91e1f0de202759b9819a6ddfd47a55c36cc283ff62f29f85bf3b7e1905d0891fb291a768755965add76b39b962a2a7a0a552c290e80de28146081ff
-
SSDEEP
3072:KT3x50VJqtHGbu5XCniylWrtGA1GHvGXaCH1Fukp1a4r3wQGY:KT3oGtmiYlW4A1QvGXjBaVQGY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
zylue.exepid process 1472 zylue.exe -
Loads dropped DLL 2 IoCs
Processes:
aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exepid process 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
zylue.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\Currentversion\Run zylue.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\{047C9F0B-4C0A-EFF8-D317-D5E65545DDC6} = "C:\\Users\\Admin\\AppData\\Roaming\\Uqoce\\zylue.exe" zylue.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exedescription pid process target process PID 368 set thread context of 1652 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe cmd.exe -
Processes:
aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Privacy aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
zylue.exepid process 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe 1472 zylue.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.execmd.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe Token: SeSecurityPrivilege 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe Token: SeSecurityPrivilege 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe Token: SeSecurityPrivilege 1652 cmd.exe Token: SeManageVolumePrivilege 752 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 752 WinMail.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exezylue.exedescription pid process target process PID 368 wrote to memory of 1472 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe zylue.exe PID 368 wrote to memory of 1472 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe zylue.exe PID 368 wrote to memory of 1472 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe zylue.exe PID 368 wrote to memory of 1472 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe zylue.exe PID 1472 wrote to memory of 1116 1472 zylue.exe taskhost.exe PID 1472 wrote to memory of 1116 1472 zylue.exe taskhost.exe PID 1472 wrote to memory of 1116 1472 zylue.exe taskhost.exe PID 1472 wrote to memory of 1116 1472 zylue.exe taskhost.exe PID 1472 wrote to memory of 1116 1472 zylue.exe taskhost.exe PID 1472 wrote to memory of 1168 1472 zylue.exe Dwm.exe PID 1472 wrote to memory of 1168 1472 zylue.exe Dwm.exe PID 1472 wrote to memory of 1168 1472 zylue.exe Dwm.exe PID 1472 wrote to memory of 1168 1472 zylue.exe Dwm.exe PID 1472 wrote to memory of 1168 1472 zylue.exe Dwm.exe PID 1472 wrote to memory of 1216 1472 zylue.exe Explorer.EXE PID 1472 wrote to memory of 1216 1472 zylue.exe Explorer.EXE PID 1472 wrote to memory of 1216 1472 zylue.exe Explorer.EXE PID 1472 wrote to memory of 1216 1472 zylue.exe Explorer.EXE PID 1472 wrote to memory of 1216 1472 zylue.exe Explorer.EXE PID 1472 wrote to memory of 368 1472 zylue.exe aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe PID 1472 wrote to memory of 368 1472 zylue.exe aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe PID 1472 wrote to memory of 368 1472 zylue.exe aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe PID 1472 wrote to memory of 368 1472 zylue.exe aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe PID 1472 wrote to memory of 368 1472 zylue.exe aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe PID 368 wrote to memory of 1652 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe cmd.exe PID 368 wrote to memory of 1652 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe cmd.exe PID 368 wrote to memory of 1652 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe cmd.exe PID 368 wrote to memory of 1652 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe cmd.exe PID 368 wrote to memory of 1652 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe cmd.exe PID 368 wrote to memory of 1652 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe cmd.exe PID 368 wrote to memory of 1652 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe cmd.exe PID 368 wrote to memory of 1652 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe cmd.exe PID 368 wrote to memory of 1652 368 aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe cmd.exe PID 1472 wrote to memory of 1984 1472 zylue.exe conhost.exe PID 1472 wrote to memory of 1984 1472 zylue.exe conhost.exe PID 1472 wrote to memory of 1984 1472 zylue.exe conhost.exe PID 1472 wrote to memory of 1984 1472 zylue.exe conhost.exe PID 1472 wrote to memory of 1984 1472 zylue.exe conhost.exe PID 1472 wrote to memory of 1796 1472 zylue.exe DllHost.exe PID 1472 wrote to memory of 1796 1472 zylue.exe DllHost.exe PID 1472 wrote to memory of 1796 1472 zylue.exe DllHost.exe PID 1472 wrote to memory of 1796 1472 zylue.exe DllHost.exe PID 1472 wrote to memory of 1796 1472 zylue.exe DllHost.exe PID 1472 wrote to memory of 1536 1472 zylue.exe DllHost.exe PID 1472 wrote to memory of 1536 1472 zylue.exe DllHost.exe PID 1472 wrote to memory of 1536 1472 zylue.exe DllHost.exe PID 1472 wrote to memory of 1536 1472 zylue.exe DllHost.exe PID 1472 wrote to memory of 1536 1472 zylue.exe DllHost.exe PID 1472 wrote to memory of 752 1472 zylue.exe WinMail.exe PID 1472 wrote to memory of 752 1472 zylue.exe WinMail.exe PID 1472 wrote to memory of 752 1472 zylue.exe WinMail.exe PID 1472 wrote to memory of 752 1472 zylue.exe WinMail.exe PID 1472 wrote to memory of 752 1472 zylue.exe WinMail.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe"C:\Users\Admin\AppData\Local\Temp\aff03b863fd65f06a31f0db098ef2fa8cef724840cd7ca6a5d64b64ec4c40a61.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Roaming\Uqoce\zylue.exe"C:\Users\Admin\AppData\Roaming\Uqoce\zylue.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpcf55cd7b.bat"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1245412661-920732166-1583437933-54198107036280316119317219351627064638350812508"1⤵PID:1984
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1796
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1536
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398B
MD50c3bfbca3cfa0f28200b479401727dfa
SHA180414a1b9fff756ab8e66f5e4216e6a671d44196
SHA256051743ef5e95837ee8b71dec2d0750da0c60f216fd658c278a1d0a393a8427ac
SHA5128d53a9d68b1879ba0331fdcf0244884abde7a88ff7db96d969b4fabe96c8786d6b0fd9c9ca987aa3439398d04ca4ea6d39ba59cf9dceb956dcaae1cb132227d7
-
Filesize
138KB
MD5d0a6f5c01bd96d266174c4302e776c35
SHA193cdbaf7e4a2d9b64607e82f09bad542d078d374
SHA256d730a56c42c8321a5233ef2d609ae6ab8f33f4531cb38bff9831486104bc97c2
SHA512d4f246521cee3fb0e6781c5fd2a219af161b30d3e4451feda0f5eeea55c561af94a9be3723761aebd6cda8d21eb4b4ffead775a3928c2f503eed5bb6e4dc9d75
-
Filesize
138KB
MD5d0a6f5c01bd96d266174c4302e776c35
SHA193cdbaf7e4a2d9b64607e82f09bad542d078d374
SHA256d730a56c42c8321a5233ef2d609ae6ab8f33f4531cb38bff9831486104bc97c2
SHA512d4f246521cee3fb0e6781c5fd2a219af161b30d3e4451feda0f5eeea55c561af94a9be3723761aebd6cda8d21eb4b4ffead775a3928c2f503eed5bb6e4dc9d75
-
Filesize
138KB
MD5d0a6f5c01bd96d266174c4302e776c35
SHA193cdbaf7e4a2d9b64607e82f09bad542d078d374
SHA256d730a56c42c8321a5233ef2d609ae6ab8f33f4531cb38bff9831486104bc97c2
SHA512d4f246521cee3fb0e6781c5fd2a219af161b30d3e4451feda0f5eeea55c561af94a9be3723761aebd6cda8d21eb4b4ffead775a3928c2f503eed5bb6e4dc9d75
-
Filesize
138KB
MD5d0a6f5c01bd96d266174c4302e776c35
SHA193cdbaf7e4a2d9b64607e82f09bad542d078d374
SHA256d730a56c42c8321a5233ef2d609ae6ab8f33f4531cb38bff9831486104bc97c2
SHA512d4f246521cee3fb0e6781c5fd2a219af161b30d3e4451feda0f5eeea55c561af94a9be3723761aebd6cda8d21eb4b4ffead775a3928c2f503eed5bb6e4dc9d75