Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 11:55
Static task
static1
Behavioral task
behavioral1
Sample
ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe
Resource
win10v2004-20220812-en
General
-
Target
ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe
-
Size
305KB
-
MD5
cafbe1859caa83efc27f2f64b82af6ce
-
SHA1
2d96fab0eaf7b49705623a95f3e7da871bea4b8c
-
SHA256
ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466
-
SHA512
db1f5fcff77cd375aff8e6a9fec634458addf05061dcb185fa980687fd2d296af38945254e18382ea2df2488a174e3b8c64219b95ab0476508a959e731052a5e
-
SSDEEP
6144:NO71gi4TG15/eG4VkWwJWcjEpCiW3JBo3QGSc2TAj0Hmeg1:N4+52kG+k7JWEunmJOLITPHmt1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
atim.exepid process 1596 atim.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 764 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exepid process 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
atim.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run atim.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\Atim = "C:\\Users\\Admin\\AppData\\Roaming\\Meofy\\atim.exe" atim.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exedescription pid process target process PID 1780 set thread context of 764 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
atim.exepid process 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe 1596 atim.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exeatim.exedescription pid process target process PID 1780 wrote to memory of 1596 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe atim.exe PID 1780 wrote to memory of 1596 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe atim.exe PID 1780 wrote to memory of 1596 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe atim.exe PID 1780 wrote to memory of 1596 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe atim.exe PID 1596 wrote to memory of 1136 1596 atim.exe taskhost.exe PID 1596 wrote to memory of 1136 1596 atim.exe taskhost.exe PID 1596 wrote to memory of 1136 1596 atim.exe taskhost.exe PID 1596 wrote to memory of 1136 1596 atim.exe taskhost.exe PID 1596 wrote to memory of 1136 1596 atim.exe taskhost.exe PID 1596 wrote to memory of 1200 1596 atim.exe Dwm.exe PID 1596 wrote to memory of 1200 1596 atim.exe Dwm.exe PID 1596 wrote to memory of 1200 1596 atim.exe Dwm.exe PID 1596 wrote to memory of 1200 1596 atim.exe Dwm.exe PID 1596 wrote to memory of 1200 1596 atim.exe Dwm.exe PID 1596 wrote to memory of 1288 1596 atim.exe Explorer.EXE PID 1596 wrote to memory of 1288 1596 atim.exe Explorer.EXE PID 1596 wrote to memory of 1288 1596 atim.exe Explorer.EXE PID 1596 wrote to memory of 1288 1596 atim.exe Explorer.EXE PID 1596 wrote to memory of 1288 1596 atim.exe Explorer.EXE PID 1596 wrote to memory of 1780 1596 atim.exe ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe PID 1596 wrote to memory of 1780 1596 atim.exe ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe PID 1596 wrote to memory of 1780 1596 atim.exe ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe PID 1596 wrote to memory of 1780 1596 atim.exe ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe PID 1596 wrote to memory of 1780 1596 atim.exe ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe PID 1780 wrote to memory of 764 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe cmd.exe PID 1780 wrote to memory of 764 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe cmd.exe PID 1780 wrote to memory of 764 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe cmd.exe PID 1780 wrote to memory of 764 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe cmd.exe PID 1780 wrote to memory of 764 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe cmd.exe PID 1780 wrote to memory of 764 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe cmd.exe PID 1780 wrote to memory of 764 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe cmd.exe PID 1780 wrote to memory of 764 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe cmd.exe PID 1780 wrote to memory of 764 1780 ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe"C:\Users\Admin\AppData\Local\Temp\ea67d3e64b2b29b9e83b2af78ef551ad2f0b4c15eff0740741109daba5f8d466.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Roaming\Meofy\atim.exe"C:\Users\Admin\AppData\Roaming\Meofy\atim.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\SAL2817.bat"2⤵
- Deletes itself
PID:764
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1200
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1136
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD56139e6a940c2e936b4a260601e1f0c24
SHA12a14356fc14a01078783299b43ef14d63d64df5e
SHA256b6fcd8c752ca1f2bf904db866248536cafd439f385197f8cc7a450c2be5227f5
SHA5127e88eb7844e5cada3a4af37af1aab380181092181bc2e645fd502bf75ff81528538143b53a7ad91b89de7d1cfad8df740805e554bb68baff22e4da610fcbd7ce
-
Filesize
305KB
MD53b26e13d105be06f930e809a95fb399c
SHA161a906ab4ee7b5d687b736f70bbbb89173cdb4c3
SHA256e78dbd8eed428347b0d77cf383451f7fc7b2843ad099005649c299b7685bff73
SHA512824d1c61af74b534ad4d7777563ed75eef7a9654a5bc58c402d47fe28fcd0e3353880d4e64a7ba7941a2dd147c63e64bfd406f2da0b4a5987ea0ca128c4cdc87
-
Filesize
305KB
MD53b26e13d105be06f930e809a95fb399c
SHA161a906ab4ee7b5d687b736f70bbbb89173cdb4c3
SHA256e78dbd8eed428347b0d77cf383451f7fc7b2843ad099005649c299b7685bff73
SHA512824d1c61af74b534ad4d7777563ed75eef7a9654a5bc58c402d47fe28fcd0e3353880d4e64a7ba7941a2dd147c63e64bfd406f2da0b4a5987ea0ca128c4cdc87
-
Filesize
305KB
MD53b26e13d105be06f930e809a95fb399c
SHA161a906ab4ee7b5d687b736f70bbbb89173cdb4c3
SHA256e78dbd8eed428347b0d77cf383451f7fc7b2843ad099005649c299b7685bff73
SHA512824d1c61af74b534ad4d7777563ed75eef7a9654a5bc58c402d47fe28fcd0e3353880d4e64a7ba7941a2dd147c63e64bfd406f2da0b4a5987ea0ca128c4cdc87
-
Filesize
305KB
MD53b26e13d105be06f930e809a95fb399c
SHA161a906ab4ee7b5d687b736f70bbbb89173cdb4c3
SHA256e78dbd8eed428347b0d77cf383451f7fc7b2843ad099005649c299b7685bff73
SHA512824d1c61af74b534ad4d7777563ed75eef7a9654a5bc58c402d47fe28fcd0e3353880d4e64a7ba7941a2dd147c63e64bfd406f2da0b4a5987ea0ca128c4cdc87