Analysis
-
max time kernel
185s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 09:21
Static task
static1
Behavioral task
behavioral1
Sample
946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe
Resource
win10v2004-20220812-en
General
-
Target
946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe
-
Size
256KB
-
MD5
196f505466314101773bc9f50ad3b2b5
-
SHA1
97986e2db4d11f4b97c1727c8d3683f6b2dd80ae
-
SHA256
946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e
-
SHA512
9b8dafb2d6d81b88723a6c96ee3abb9cb509dff3aa17490e73b543215cfee92645635e3bd6b53a8eec522b4d9b3539e25e946f90f961b76e4505fd90059465cc
-
SSDEEP
3072:BDR1MBlhoJNJ1nrunt3CKYQ/Szu32znYIr56+6SpMgvzr9LFE:BQB8JP1nbBzupIrx6KMgfE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
yhxy.exeyhxy.exepid process 1772 yhxy.exe 1676 yhxy.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 700 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exepid process 2004 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe 2004 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
yhxy.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run yhxy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{93ED5294-A84F-C11A-BC09-F0E77D2DB917} = "C:\\Users\\Admin\\AppData\\Roaming\\Roric\\yhxy.exe" yhxy.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exeyhxy.exedescription pid process target process PID 1568 set thread context of 2004 1568 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe PID 1772 set thread context of 1676 1772 yhxy.exe yhxy.exe -
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" cmd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
yhxy.exepid process 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe 1676 yhxy.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.execmd.exedescription pid process Token: SeSecurityPrivilege 2004 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe Token: SeSecurityPrivilege 700 cmd.exe Token: SeSecurityPrivilege 700 cmd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exeyhxy.exepid process 1568 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe 1772 yhxy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exeyhxy.exeyhxy.exedescription pid process target process PID 1568 wrote to memory of 2004 1568 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe PID 1568 wrote to memory of 2004 1568 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe PID 1568 wrote to memory of 2004 1568 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe PID 1568 wrote to memory of 2004 1568 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe PID 1568 wrote to memory of 2004 1568 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe PID 1568 wrote to memory of 2004 1568 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe PID 1568 wrote to memory of 2004 1568 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe PID 1568 wrote to memory of 2004 1568 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe PID 1568 wrote to memory of 2004 1568 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe PID 2004 wrote to memory of 1772 2004 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe yhxy.exe PID 2004 wrote to memory of 1772 2004 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe yhxy.exe PID 2004 wrote to memory of 1772 2004 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe yhxy.exe PID 2004 wrote to memory of 1772 2004 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe yhxy.exe PID 1772 wrote to memory of 1676 1772 yhxy.exe yhxy.exe PID 1772 wrote to memory of 1676 1772 yhxy.exe yhxy.exe PID 1772 wrote to memory of 1676 1772 yhxy.exe yhxy.exe PID 1772 wrote to memory of 1676 1772 yhxy.exe yhxy.exe PID 1772 wrote to memory of 1676 1772 yhxy.exe yhxy.exe PID 1772 wrote to memory of 1676 1772 yhxy.exe yhxy.exe PID 1772 wrote to memory of 1676 1772 yhxy.exe yhxy.exe PID 1772 wrote to memory of 1676 1772 yhxy.exe yhxy.exe PID 1772 wrote to memory of 1676 1772 yhxy.exe yhxy.exe PID 2004 wrote to memory of 700 2004 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe cmd.exe PID 2004 wrote to memory of 700 2004 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe cmd.exe PID 2004 wrote to memory of 700 2004 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe cmd.exe PID 2004 wrote to memory of 700 2004 946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe cmd.exe PID 1676 wrote to memory of 1140 1676 yhxy.exe taskhost.exe PID 1676 wrote to memory of 1140 1676 yhxy.exe taskhost.exe PID 1676 wrote to memory of 1140 1676 yhxy.exe taskhost.exe PID 1676 wrote to memory of 1140 1676 yhxy.exe taskhost.exe PID 1676 wrote to memory of 1140 1676 yhxy.exe taskhost.exe PID 1676 wrote to memory of 1228 1676 yhxy.exe Dwm.exe PID 1676 wrote to memory of 1228 1676 yhxy.exe Dwm.exe PID 1676 wrote to memory of 1228 1676 yhxy.exe Dwm.exe PID 1676 wrote to memory of 1228 1676 yhxy.exe Dwm.exe PID 1676 wrote to memory of 1228 1676 yhxy.exe Dwm.exe PID 1676 wrote to memory of 1284 1676 yhxy.exe Explorer.EXE PID 1676 wrote to memory of 1284 1676 yhxy.exe Explorer.EXE PID 1676 wrote to memory of 1284 1676 yhxy.exe Explorer.EXE PID 1676 wrote to memory of 1284 1676 yhxy.exe Explorer.EXE PID 1676 wrote to memory of 1284 1676 yhxy.exe Explorer.EXE PID 1676 wrote to memory of 700 1676 yhxy.exe cmd.exe PID 1676 wrote to memory of 700 1676 yhxy.exe cmd.exe PID 1676 wrote to memory of 700 1676 yhxy.exe cmd.exe PID 1676 wrote to memory of 700 1676 yhxy.exe cmd.exe PID 1676 wrote to memory of 700 1676 yhxy.exe cmd.exe PID 1676 wrote to memory of 812 1676 yhxy.exe conhost.exe PID 1676 wrote to memory of 1036 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1036 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1036 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1036 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1036 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1516 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1516 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1516 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1516 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1516 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1596 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1596 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1596 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1596 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1596 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1768 1676 yhxy.exe DllHost.exe PID 1676 wrote to memory of 1768 1676 yhxy.exe DllHost.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1228
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe"C:\Users\Admin\AppData\Local\Temp\946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe"C:\Users\Admin\AppData\Local\Temp\946e011cc9cd2bd27bfda5a8c8fa185ecd59c7e6bee091f5fc59194a67ef973e.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Roaming\Roric\yhxy.exe"C:\Users\Admin\AppData\Roaming\Roric\yhxy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Roaming\Roric\yhxy.exe"C:\Users\Admin\AppData\Roaming\Roric\yhxy.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp5b5c3150.bat"3⤵
- Deletes itself
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
PID:700
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1746065131-528677819668113625-1110390943-1496795501-107686096136537271656856356"1⤵PID:812
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1036
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1516
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1596
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD52ec98a290532a5751e6a8ec799b3321b
SHA1aab4d4d4460f6a6b20b7a73e4112be788978ea76
SHA256136dcc21176a24382551ad2ae1223e079f5891385ed6e1e8ec480856537156bc
SHA512ad6bcaf0e8d55fdc3a69ff54cc9b34072fdc44fe5903ac031aaf2bd204d4fb6f606580fa80fcf1fcfa8c6158e037b24c6f47381a34251dbcd31d20197ce48720
-
Filesize
256KB
MD52d9e9ae46e58b9ad89dbf61a4a89b9b4
SHA17854f709a4ec0d0bb2e05c222559e818620cd89a
SHA256b0e71c070a0224fd1689cc2e2e7fc62b2b11a3ef5fb721b8d57016d51a5ea661
SHA512e02c80fb7e6b65701292a2ead31b6404d786da3c5731c2d08a37a56c448fa872ce342102cc0f4ae71785974d1b63058a2804ee71bed68137992da28114929c18
-
Filesize
256KB
MD52d9e9ae46e58b9ad89dbf61a4a89b9b4
SHA17854f709a4ec0d0bb2e05c222559e818620cd89a
SHA256b0e71c070a0224fd1689cc2e2e7fc62b2b11a3ef5fb721b8d57016d51a5ea661
SHA512e02c80fb7e6b65701292a2ead31b6404d786da3c5731c2d08a37a56c448fa872ce342102cc0f4ae71785974d1b63058a2804ee71bed68137992da28114929c18
-
Filesize
256KB
MD52d9e9ae46e58b9ad89dbf61a4a89b9b4
SHA17854f709a4ec0d0bb2e05c222559e818620cd89a
SHA256b0e71c070a0224fd1689cc2e2e7fc62b2b11a3ef5fb721b8d57016d51a5ea661
SHA512e02c80fb7e6b65701292a2ead31b6404d786da3c5731c2d08a37a56c448fa872ce342102cc0f4ae71785974d1b63058a2804ee71bed68137992da28114929c18
-
Filesize
256KB
MD52d9e9ae46e58b9ad89dbf61a4a89b9b4
SHA17854f709a4ec0d0bb2e05c222559e818620cd89a
SHA256b0e71c070a0224fd1689cc2e2e7fc62b2b11a3ef5fb721b8d57016d51a5ea661
SHA512e02c80fb7e6b65701292a2ead31b6404d786da3c5731c2d08a37a56c448fa872ce342102cc0f4ae71785974d1b63058a2804ee71bed68137992da28114929c18
-
Filesize
256KB
MD52d9e9ae46e58b9ad89dbf61a4a89b9b4
SHA17854f709a4ec0d0bb2e05c222559e818620cd89a
SHA256b0e71c070a0224fd1689cc2e2e7fc62b2b11a3ef5fb721b8d57016d51a5ea661
SHA512e02c80fb7e6b65701292a2ead31b6404d786da3c5731c2d08a37a56c448fa872ce342102cc0f4ae71785974d1b63058a2804ee71bed68137992da28114929c18