Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 09:26
Static task
static1
Behavioral task
behavioral1
Sample
366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe
Resource
win10v2004-20220812-en
General
-
Target
366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe
-
Size
407KB
-
MD5
8d45f92c1ea9c8ee2acb522c1537eacc
-
SHA1
f4a2becc8c19a864edf43cbfad7a6371fd14ddfd
-
SHA256
366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a
-
SHA512
749a741813046285e1d4c31bb01573b62c3de473b1d85d93aafc80931dbd539920c218bc6869ccc04b6a6fa07471bc3a4c4135cfce07905eeea1cef672cc0401
-
SSDEEP
6144:EvKud9DhiNsmtlR2TYe4iPC02HUlm6BYyDixaT:Eol2TD4iPC1HUlm6BYy+aT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
ohopy.exeohopy.exepid process 1344 ohopy.exe 920 ohopy.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1036 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exepid process 1636 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe 1636 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ohopy.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\Currentversion\Run ohopy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\{5BB0E1C6-02C3-4EEE-CAEC-AB7FBFFA1BAE} = "C:\\Users\\Admin\\AppData\\Roaming\\Obzyih\\ohopy.exe" ohopy.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exeohopy.exedescription pid process target process PID 1004 set thread context of 1636 1004 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe PID 1344 set thread context of 920 1344 ohopy.exe ohopy.exe -
Processes:
366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Privacy 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
ohopy.exepid process 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe 920 ohopy.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.execmd.exedescription pid process Token: SeSecurityPrivilege 1636 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe Token: SeSecurityPrivilege 1636 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe Token: SeSecurityPrivilege 1636 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe Token: SeSecurityPrivilege 1036 cmd.exe Token: SeSecurityPrivilege 1036 cmd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exeohopy.exepid process 1004 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe 1344 ohopy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exeohopy.exeohopy.exedescription pid process target process PID 1004 wrote to memory of 1636 1004 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe PID 1004 wrote to memory of 1636 1004 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe PID 1004 wrote to memory of 1636 1004 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe PID 1004 wrote to memory of 1636 1004 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe PID 1004 wrote to memory of 1636 1004 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe PID 1004 wrote to memory of 1636 1004 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe PID 1004 wrote to memory of 1636 1004 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe PID 1004 wrote to memory of 1636 1004 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe PID 1004 wrote to memory of 1636 1004 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe PID 1636 wrote to memory of 1344 1636 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe ohopy.exe PID 1636 wrote to memory of 1344 1636 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe ohopy.exe PID 1636 wrote to memory of 1344 1636 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe ohopy.exe PID 1636 wrote to memory of 1344 1636 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe ohopy.exe PID 1344 wrote to memory of 920 1344 ohopy.exe ohopy.exe PID 1344 wrote to memory of 920 1344 ohopy.exe ohopy.exe PID 1344 wrote to memory of 920 1344 ohopy.exe ohopy.exe PID 1344 wrote to memory of 920 1344 ohopy.exe ohopy.exe PID 1344 wrote to memory of 920 1344 ohopy.exe ohopy.exe PID 1344 wrote to memory of 920 1344 ohopy.exe ohopy.exe PID 1344 wrote to memory of 920 1344 ohopy.exe ohopy.exe PID 1344 wrote to memory of 920 1344 ohopy.exe ohopy.exe PID 1344 wrote to memory of 920 1344 ohopy.exe ohopy.exe PID 920 wrote to memory of 1144 920 ohopy.exe taskhost.exe PID 920 wrote to memory of 1144 920 ohopy.exe taskhost.exe PID 920 wrote to memory of 1144 920 ohopy.exe taskhost.exe PID 920 wrote to memory of 1144 920 ohopy.exe taskhost.exe PID 920 wrote to memory of 1144 920 ohopy.exe taskhost.exe PID 920 wrote to memory of 1240 920 ohopy.exe Dwm.exe PID 920 wrote to memory of 1240 920 ohopy.exe Dwm.exe PID 920 wrote to memory of 1240 920 ohopy.exe Dwm.exe PID 920 wrote to memory of 1240 920 ohopy.exe Dwm.exe PID 920 wrote to memory of 1240 920 ohopy.exe Dwm.exe PID 920 wrote to memory of 1276 920 ohopy.exe Explorer.EXE PID 920 wrote to memory of 1276 920 ohopy.exe Explorer.EXE PID 920 wrote to memory of 1276 920 ohopy.exe Explorer.EXE PID 920 wrote to memory of 1276 920 ohopy.exe Explorer.EXE PID 920 wrote to memory of 1276 920 ohopy.exe Explorer.EXE PID 920 wrote to memory of 1636 920 ohopy.exe 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe PID 920 wrote to memory of 1636 920 ohopy.exe 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe PID 920 wrote to memory of 1636 920 ohopy.exe 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe PID 920 wrote to memory of 1636 920 ohopy.exe 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe PID 920 wrote to memory of 1636 920 ohopy.exe 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe PID 1636 wrote to memory of 1036 1636 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe cmd.exe PID 1636 wrote to memory of 1036 1636 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe cmd.exe PID 1636 wrote to memory of 1036 1636 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe cmd.exe PID 1636 wrote to memory of 1036 1636 366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe cmd.exe PID 920 wrote to memory of 1036 920 ohopy.exe cmd.exe PID 920 wrote to memory of 1036 920 ohopy.exe cmd.exe PID 920 wrote to memory of 1036 920 ohopy.exe cmd.exe PID 920 wrote to memory of 1036 920 ohopy.exe cmd.exe PID 920 wrote to memory of 1036 920 ohopy.exe cmd.exe PID 920 wrote to memory of 480 920 ohopy.exe DllHost.exe PID 920 wrote to memory of 480 920 ohopy.exe DllHost.exe PID 920 wrote to memory of 480 920 ohopy.exe DllHost.exe PID 920 wrote to memory of 480 920 ohopy.exe DllHost.exe PID 920 wrote to memory of 480 920 ohopy.exe DllHost.exe PID 920 wrote to memory of 1880 920 ohopy.exe DllHost.exe PID 920 wrote to memory of 1880 920 ohopy.exe DllHost.exe PID 920 wrote to memory of 1880 920 ohopy.exe DllHost.exe PID 920 wrote to memory of 1880 920 ohopy.exe DllHost.exe PID 920 wrote to memory of 1880 920 ohopy.exe DllHost.exe PID 920 wrote to memory of 1268 920 ohopy.exe DllHost.exe PID 920 wrote to memory of 1268 920 ohopy.exe DllHost.exe PID 920 wrote to memory of 1268 920 ohopy.exe DllHost.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1240
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe"C:\Users\Admin\AppData\Local\Temp\366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe"C:\Users\Admin\AppData\Local\Temp\366690c685fc07d6f8ca2ac2c7aadef54656b48c320b116c739c28efbddf1b5a.exe"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Roaming\Obzyih\ohopy.exe"C:\Users\Admin\AppData\Roaming\Obzyih\ohopy.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Roaming\Obzyih\ohopy.exe"C:\Users\Admin\AppData\Roaming\Obzyih\ohopy.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp582e7404.bat"4⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1144
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:480
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1880
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD52fc975230f6468db3049b247cbe73274
SHA1431581e4a7208b857398ebf0e1c26eb9971c7070
SHA2564b9304983ec8f52a3244b1c4c4b457457b54691460723225575f396238a11431
SHA512846a3cae5511a513f9db5406ed2cc4f3a4015054422fb82cbadaab7597aaaf1379cda05ba3d15f8e360ca5b1be19cf8c6f1b6fa5059fc634ed2da209c30f7bde
-
Filesize
407KB
MD50a6ff7653efd4d9d508f4173e4739014
SHA119336f3d93148caaea8ca7cf7b1b9ca2ef4217fb
SHA2562f5feb9085b87ef23c98bfa2c0a18a9e45ad84d5f8aea3cdadd46b36e61e7564
SHA512a04d338ece55253abe998707ecdc4db327ed6fc3aa0033134a6481dd21fd333ce00b248ef3f6d02bc717f72b5bc20a97725e2dafa4f92123f9c5e342fd4c9b92
-
Filesize
407KB
MD50a6ff7653efd4d9d508f4173e4739014
SHA119336f3d93148caaea8ca7cf7b1b9ca2ef4217fb
SHA2562f5feb9085b87ef23c98bfa2c0a18a9e45ad84d5f8aea3cdadd46b36e61e7564
SHA512a04d338ece55253abe998707ecdc4db327ed6fc3aa0033134a6481dd21fd333ce00b248ef3f6d02bc717f72b5bc20a97725e2dafa4f92123f9c5e342fd4c9b92
-
Filesize
407KB
MD50a6ff7653efd4d9d508f4173e4739014
SHA119336f3d93148caaea8ca7cf7b1b9ca2ef4217fb
SHA2562f5feb9085b87ef23c98bfa2c0a18a9e45ad84d5f8aea3cdadd46b36e61e7564
SHA512a04d338ece55253abe998707ecdc4db327ed6fc3aa0033134a6481dd21fd333ce00b248ef3f6d02bc717f72b5bc20a97725e2dafa4f92123f9c5e342fd4c9b92
-
Filesize
398B
MD58654e1bbebb09ec319bb6046bad3973f
SHA1e8e71ecc71476b484a611672a275539bd471784d
SHA256420640e89baa98bc3b2d926b0201dd5394eae03caf3879cf511572a4f765db39
SHA512291f75867b5a8ff18e652fad848799d5f2d1f7fd21dc6c1743e3e7d67bcb3e010416d2ab149a329b4c2b0dfe8b85fc0e7f1ae6d78f7079899a062522aab2fa6a
-
Filesize
721B
MD5e25a26ceefe4de0997cad2cba14ec676
SHA1a911cbae34b6ffc4ae0385c8e3de8caa618668a3
SHA256e594ba9bb2da643d4117f0982d4ed7a42e940984e0b563107b8f4a8c57a3bfd1
SHA512f92b5ad2123db73158d9cf3ec4736ddd79779f82710a76832b12599f0facc88e67c188a30ff8c0bc51474f0ad3d8b50e63a1313f3a55b8f0d60b85fa23106213
-
Filesize
407KB
MD50a6ff7653efd4d9d508f4173e4739014
SHA119336f3d93148caaea8ca7cf7b1b9ca2ef4217fb
SHA2562f5feb9085b87ef23c98bfa2c0a18a9e45ad84d5f8aea3cdadd46b36e61e7564
SHA512a04d338ece55253abe998707ecdc4db327ed6fc3aa0033134a6481dd21fd333ce00b248ef3f6d02bc717f72b5bc20a97725e2dafa4f92123f9c5e342fd4c9b92
-
Filesize
407KB
MD50a6ff7653efd4d9d508f4173e4739014
SHA119336f3d93148caaea8ca7cf7b1b9ca2ef4217fb
SHA2562f5feb9085b87ef23c98bfa2c0a18a9e45ad84d5f8aea3cdadd46b36e61e7564
SHA512a04d338ece55253abe998707ecdc4db327ed6fc3aa0033134a6481dd21fd333ce00b248ef3f6d02bc717f72b5bc20a97725e2dafa4f92123f9c5e342fd4c9b92