Analysis
-
max time kernel
134s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 19:08
Static task
static1
Behavioral task
behavioral1
Sample
cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe
Resource
win10v2004-20221111-en
General
-
Target
cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe
-
Size
228KB
-
MD5
0a6678f8421116ddd57ea116c104b062
-
SHA1
514b5eaa79e2ac1049d09ecce555a59e9ea388e1
-
SHA256
cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e
-
SHA512
82ff67dcd5bf7ac3b5286248ee3a0105bcaacb4d3cd6387c4bdb99877017bd46efa250d6286d802a59502a59475bbb00590173d64dccadbc592ceea151294ec2
-
SSDEEP
6144:MBO8MDptfN0zKcOOYHliCBQb+F/irkJbj9DvD:h8MrqKckl9eyFuubj9DvD
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 5 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\explorer.exe = "C:\\Windows\\SysWOW64\\explorer.exe:*:Enabled:Windows Explorer" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List explorer.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\system32\taskhost.exe = "C:\\Windows\\system32\\taskhost.exe:*:Enabled:Host Process for Windows Tasks" explorer.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\system32\taskhostex.exe = "C:\\Windows\\system32\\taskhostex.exe:*:Enabled:Host Process for Windows Tasks" explorer.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\explorer.exe = "C:\\Windows\\explorer.exe:*:Enabled:Windows Explorer" explorer.exe -
Executes dropped EXE 2 IoCs
Processes:
evil.exeevil.exepid process 1488 evil.exe 1336 evil.exe -
Deletes itself 1 IoCs
Processes:
explorer.exepid process 1172 explorer.exe -
Loads dropped DLL 1 IoCs
Processes:
cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exepid process 872 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\Currentversion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\{DEFDA942-3542-2BDE-90F5-6F0EBF05DDED} = "C:\\Users\\Admin\\AppData\\Roaming\\Ipys\\evil.exe" explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exeevil.exedescription pid process target process PID 1016 set thread context of 872 1016 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe PID 1488 set thread context of 1336 1488 evil.exe evil.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\186F39D0-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exeevil.exeevil.exeexplorer.exepid process 1016 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe 1016 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe 1488 evil.exe 1488 evil.exe 1336 evil.exe 1336 evil.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
evil.exepid process 1336 evil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 872 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe Token: SeManageVolumePrivilege 572 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WinMail.exepid process 572 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WinMail.exepid process 572 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 572 WinMail.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.execca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exeevil.exeevil.exeexplorer.exedescription pid process target process PID 1016 wrote to memory of 872 1016 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe PID 1016 wrote to memory of 872 1016 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe PID 1016 wrote to memory of 872 1016 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe PID 1016 wrote to memory of 872 1016 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe PID 1016 wrote to memory of 872 1016 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe PID 1016 wrote to memory of 872 1016 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe PID 1016 wrote to memory of 872 1016 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe PID 1016 wrote to memory of 872 1016 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe PID 1016 wrote to memory of 872 1016 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe PID 1016 wrote to memory of 872 1016 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe PID 872 wrote to memory of 1488 872 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe evil.exe PID 872 wrote to memory of 1488 872 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe evil.exe PID 872 wrote to memory of 1488 872 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe evil.exe PID 872 wrote to memory of 1488 872 cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe evil.exe PID 1488 wrote to memory of 1336 1488 evil.exe evil.exe PID 1488 wrote to memory of 1336 1488 evil.exe evil.exe PID 1488 wrote to memory of 1336 1488 evil.exe evil.exe PID 1488 wrote to memory of 1336 1488 evil.exe evil.exe PID 1488 wrote to memory of 1336 1488 evil.exe evil.exe PID 1488 wrote to memory of 1336 1488 evil.exe evil.exe PID 1488 wrote to memory of 1336 1488 evil.exe evil.exe PID 1488 wrote to memory of 1336 1488 evil.exe evil.exe PID 1488 wrote to memory of 1336 1488 evil.exe evil.exe PID 1488 wrote to memory of 1336 1488 evil.exe evil.exe PID 1336 wrote to memory of 1172 1336 evil.exe explorer.exe PID 1336 wrote to memory of 1172 1336 evil.exe explorer.exe PID 1336 wrote to memory of 1172 1336 evil.exe explorer.exe PID 1336 wrote to memory of 1172 1336 evil.exe explorer.exe PID 1172 wrote to memory of 1264 1172 explorer.exe Explorer.EXE PID 1172 wrote to memory of 1264 1172 explorer.exe Explorer.EXE PID 1172 wrote to memory of 1264 1172 explorer.exe Explorer.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe"C:\Users\Admin\AppData\Local\Temp\cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe"C:\Users\Admin\AppData\Local\Temp\cca05751903294ebd93629d331d25bfd2706bbc07ff4ed121141855862f4658e.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Roaming\Ipys\evil.exe"C:\Users\Admin\AppData\Roaming\Ipys\evil.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Roaming\Ipys\evil.exe"C:\Users\Admin\AppData\Roaming\Ipys\evil.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵
- Modifies firewall policy service
- Deletes itself
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5a0725d5d7ac096fe42666fb0485a3164
SHA132b9bb8912a5677e669796827294224754a1fc89
SHA256bca4a6c98d2f8f73c405219d1341def2690aeb290a90a9b2f2954d7d77c838aa
SHA5129a1cb7325eaa0a8a159d30b6ad10c2d56bf9b43ca2f9c0eb24b9f3aff76bb86c0d1d2a7c7866a0d222b319fb6f72f9c532e552b0af10906114a82861455eb456
-
Filesize
228KB
MD5a0725d5d7ac096fe42666fb0485a3164
SHA132b9bb8912a5677e669796827294224754a1fc89
SHA256bca4a6c98d2f8f73c405219d1341def2690aeb290a90a9b2f2954d7d77c838aa
SHA5129a1cb7325eaa0a8a159d30b6ad10c2d56bf9b43ca2f9c0eb24b9f3aff76bb86c0d1d2a7c7866a0d222b319fb6f72f9c532e552b0af10906114a82861455eb456
-
Filesize
228KB
MD5a0725d5d7ac096fe42666fb0485a3164
SHA132b9bb8912a5677e669796827294224754a1fc89
SHA256bca4a6c98d2f8f73c405219d1341def2690aeb290a90a9b2f2954d7d77c838aa
SHA5129a1cb7325eaa0a8a159d30b6ad10c2d56bf9b43ca2f9c0eb24b9f3aff76bb86c0d1d2a7c7866a0d222b319fb6f72f9c532e552b0af10906114a82861455eb456
-
Filesize
228KB
MD5a0725d5d7ac096fe42666fb0485a3164
SHA132b9bb8912a5677e669796827294224754a1fc89
SHA256bca4a6c98d2f8f73c405219d1341def2690aeb290a90a9b2f2954d7d77c838aa
SHA5129a1cb7325eaa0a8a159d30b6ad10c2d56bf9b43ca2f9c0eb24b9f3aff76bb86c0d1d2a7c7866a0d222b319fb6f72f9c532e552b0af10906114a82861455eb456