Analysis
-
max time kernel
153s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 10:15
Static task
static1
Behavioral task
behavioral1
Sample
d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe
Resource
win10v2004-20220812-en
General
-
Target
d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe
-
Size
262KB
-
MD5
bb1ad57760a1ca3fdffd86c2539c7031
-
SHA1
e29b1944ce1d7dd3b611adb6dec5e99e0bb4e141
-
SHA256
d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b
-
SHA512
4facb0b42ddd92b304c7f5c4f5488585cbbf7473fff07c8549d7a8ad50b3352810b8f387fd6ca86af0b455831b9c819900dbf4502a7f2c9fa4fc257fd193e443
-
SSDEEP
6144:UpNzqRprtJZaWmGcqRoOUeMz122/lSzsLt/pVkMM:UvqLk/eLU1cYlSzC/cMM
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
myix.exemyix.exepid process 1356 myix.exe 1132 myix.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2004 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exepid process 1364 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe 1364 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
myix.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run myix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{1E92AE8F-51AB-A7A6-6B0E-CDA52E534C66} = "C:\\Users\\Admin\\AppData\\Roaming\\Uzni\\myix.exe" myix.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exemyix.exedescription pid process target process PID 1196 set thread context of 1364 1196 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe PID 1356 set thread context of 1132 1356 myix.exe myix.exe -
Processes:
d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
myix.exepid process 1132 myix.exe 1132 myix.exe 1132 myix.exe 1132 myix.exe 1132 myix.exe 1132 myix.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exedescription pid process Token: SeSecurityPrivilege 1364 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe Token: SeSecurityPrivilege 1364 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exemyix.exepid process 1196 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe 1356 myix.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exed0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exemyix.exemyix.exedescription pid process target process PID 1196 wrote to memory of 1364 1196 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe PID 1196 wrote to memory of 1364 1196 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe PID 1196 wrote to memory of 1364 1196 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe PID 1196 wrote to memory of 1364 1196 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe PID 1196 wrote to memory of 1364 1196 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe PID 1196 wrote to memory of 1364 1196 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe PID 1196 wrote to memory of 1364 1196 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe PID 1196 wrote to memory of 1364 1196 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe PID 1196 wrote to memory of 1364 1196 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe PID 1364 wrote to memory of 1356 1364 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe myix.exe PID 1364 wrote to memory of 1356 1364 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe myix.exe PID 1364 wrote to memory of 1356 1364 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe myix.exe PID 1364 wrote to memory of 1356 1364 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe myix.exe PID 1356 wrote to memory of 1132 1356 myix.exe myix.exe PID 1356 wrote to memory of 1132 1356 myix.exe myix.exe PID 1356 wrote to memory of 1132 1356 myix.exe myix.exe PID 1356 wrote to memory of 1132 1356 myix.exe myix.exe PID 1356 wrote to memory of 1132 1356 myix.exe myix.exe PID 1356 wrote to memory of 1132 1356 myix.exe myix.exe PID 1356 wrote to memory of 1132 1356 myix.exe myix.exe PID 1356 wrote to memory of 1132 1356 myix.exe myix.exe PID 1356 wrote to memory of 1132 1356 myix.exe myix.exe PID 1132 wrote to memory of 1124 1132 myix.exe taskhost.exe PID 1132 wrote to memory of 1124 1132 myix.exe taskhost.exe PID 1132 wrote to memory of 1124 1132 myix.exe taskhost.exe PID 1132 wrote to memory of 1124 1132 myix.exe taskhost.exe PID 1132 wrote to memory of 1124 1132 myix.exe taskhost.exe PID 1132 wrote to memory of 1232 1132 myix.exe Dwm.exe PID 1132 wrote to memory of 1232 1132 myix.exe Dwm.exe PID 1132 wrote to memory of 1232 1132 myix.exe Dwm.exe PID 1132 wrote to memory of 1232 1132 myix.exe Dwm.exe PID 1132 wrote to memory of 1232 1132 myix.exe Dwm.exe PID 1132 wrote to memory of 1288 1132 myix.exe Explorer.EXE PID 1132 wrote to memory of 1288 1132 myix.exe Explorer.EXE PID 1132 wrote to memory of 1288 1132 myix.exe Explorer.EXE PID 1132 wrote to memory of 1288 1132 myix.exe Explorer.EXE PID 1132 wrote to memory of 1288 1132 myix.exe Explorer.EXE PID 1132 wrote to memory of 1364 1132 myix.exe d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe PID 1132 wrote to memory of 1364 1132 myix.exe d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe PID 1132 wrote to memory of 1364 1132 myix.exe d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe PID 1132 wrote to memory of 1364 1132 myix.exe d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe PID 1132 wrote to memory of 1364 1132 myix.exe d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe PID 1364 wrote to memory of 2004 1364 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe cmd.exe PID 1364 wrote to memory of 2004 1364 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe cmd.exe PID 1364 wrote to memory of 2004 1364 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe cmd.exe PID 1364 wrote to memory of 2004 1364 d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe cmd.exe PID 1132 wrote to memory of 2004 1132 myix.exe cmd.exe PID 1132 wrote to memory of 2004 1132 myix.exe cmd.exe PID 1132 wrote to memory of 2004 1132 myix.exe cmd.exe PID 1132 wrote to memory of 2004 1132 myix.exe cmd.exe PID 1132 wrote to memory of 2004 1132 myix.exe cmd.exe PID 1132 wrote to memory of 1620 1132 myix.exe conhost.exe PID 1132 wrote to memory of 1548 1132 myix.exe DllHost.exe PID 1132 wrote to memory of 1548 1132 myix.exe DllHost.exe PID 1132 wrote to memory of 1548 1132 myix.exe DllHost.exe PID 1132 wrote to memory of 1548 1132 myix.exe DllHost.exe PID 1132 wrote to memory of 1548 1132 myix.exe DllHost.exe PID 1132 wrote to memory of 1192 1132 myix.exe DllHost.exe PID 1132 wrote to memory of 1192 1132 myix.exe DllHost.exe PID 1132 wrote to memory of 1192 1132 myix.exe DllHost.exe PID 1132 wrote to memory of 1192 1132 myix.exe DllHost.exe PID 1132 wrote to memory of 1192 1132 myix.exe DllHost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe"C:\Users\Admin\AppData\Local\Temp\d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe"C:\Users\Admin\AppData\Local\Temp\d0cad76b2cd313f7346ad89787a7a03249638cc4a848df8246e0edf6f118737b.exe"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Roaming\Uzni\myix.exe"C:\Users\Admin\AppData\Roaming\Uzni\myix.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Roaming\Uzni\myix.exe"C:\Users\Admin\AppData\Roaming\Uzni\myix.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpcb5eb189.bat"4⤵
- Deletes itself
PID:2004
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1232
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "12374672001409634653-421093261-2000258921194385841710707685382058058849-608132333"1⤵PID:1620
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1548
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5fcc58994c0b6766cc06fbb0b9c819cf6
SHA170a7b9fdacf44912cc9ea46805976c785ce9806f
SHA256f28a50f1afaaf229fc1b424281152e54b8bb62c74bd2245abd5497bf6da05889
SHA51229f96cf1e3a58c19b6d6b5b6f318a6f6ec491304ca7c9e14dfb8a0ca130c7873bb068a585165c0f84e76763e60f0956caa751334e029df2a7efee745648421c4
-
Filesize
262KB
MD51bb67908bcfe942dcbc4c224885ff501
SHA1665250a2420deedf4973c490f57da54fcf7330fe
SHA2564ce5833bb18c6970a1b9d09882a72920ad62ec7ffc1c6936e01359e4fbc4b3dc
SHA512be9f5ff0b6bcd6728f7db59cc9ab0209c956aa49a42d0fd8bd25626b274e20d22890c05f3b6924ce489a5387e811881da0523376d3ec016df28ef7db0f515e6a
-
Filesize
262KB
MD51bb67908bcfe942dcbc4c224885ff501
SHA1665250a2420deedf4973c490f57da54fcf7330fe
SHA2564ce5833bb18c6970a1b9d09882a72920ad62ec7ffc1c6936e01359e4fbc4b3dc
SHA512be9f5ff0b6bcd6728f7db59cc9ab0209c956aa49a42d0fd8bd25626b274e20d22890c05f3b6924ce489a5387e811881da0523376d3ec016df28ef7db0f515e6a
-
Filesize
262KB
MD51bb67908bcfe942dcbc4c224885ff501
SHA1665250a2420deedf4973c490f57da54fcf7330fe
SHA2564ce5833bb18c6970a1b9d09882a72920ad62ec7ffc1c6936e01359e4fbc4b3dc
SHA512be9f5ff0b6bcd6728f7db59cc9ab0209c956aa49a42d0fd8bd25626b274e20d22890c05f3b6924ce489a5387e811881da0523376d3ec016df28ef7db0f515e6a
-
Filesize
262KB
MD51bb67908bcfe942dcbc4c224885ff501
SHA1665250a2420deedf4973c490f57da54fcf7330fe
SHA2564ce5833bb18c6970a1b9d09882a72920ad62ec7ffc1c6936e01359e4fbc4b3dc
SHA512be9f5ff0b6bcd6728f7db59cc9ab0209c956aa49a42d0fd8bd25626b274e20d22890c05f3b6924ce489a5387e811881da0523376d3ec016df28ef7db0f515e6a
-
Filesize
262KB
MD51bb67908bcfe942dcbc4c224885ff501
SHA1665250a2420deedf4973c490f57da54fcf7330fe
SHA2564ce5833bb18c6970a1b9d09882a72920ad62ec7ffc1c6936e01359e4fbc4b3dc
SHA512be9f5ff0b6bcd6728f7db59cc9ab0209c956aa49a42d0fd8bd25626b274e20d22890c05f3b6924ce489a5387e811881da0523376d3ec016df28ef7db0f515e6a