Analysis
-
max time kernel
188s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 22:36
Static task
static1
Behavioral task
behavioral1
Sample
1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe
Resource
win10v2004-20220812-en
General
-
Target
1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe
-
Size
483KB
-
MD5
cc6508c655aa5ad24cee66148b841d87
-
SHA1
9c845c777287c9048cef6838416b54259f8d7eab
-
SHA256
1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b
-
SHA512
a49636bf7e60e876757d148473279298c8eb0c5d34a3e2aec0de8416f1885a3664cb8364212b49a277e01abfa6ade76a1d25c52939f7a97c1c38fe16cea95312
-
SSDEEP
12288:PH/5rxiLJgVTFZNg+aU/UBrxiLJgVTFZNg+aU/Uh:PnUqVTTN5aU/UHUqVTTN5aU/Uh
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
elyl.exeelyl.exepid process 576 elyl.exe 1912 elyl.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 616 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exepid process 2028 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
elyl.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\Currentversion\Run elyl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\{E1315C7D-7721-31FA-E60D-A28ABA701284} = "C:\\Users\\Admin\\AppData\\Roaming\\Lusawi\\elyl.exe" elyl.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exeelyl.exedescription pid process target process PID 1740 set thread context of 2028 1740 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe PID 576 set thread context of 1912 576 elyl.exe elyl.exe -
Processes:
1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
elyl.exepid process 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe 1912 elyl.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exeelyl.exepid process 1740 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe 576 elyl.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exedescription pid process Token: SeSecurityPrivilege 2028 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe -
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exeelyl.exeelyl.exedescription pid process target process PID 1740 wrote to memory of 2028 1740 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe PID 1740 wrote to memory of 2028 1740 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe PID 1740 wrote to memory of 2028 1740 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe PID 1740 wrote to memory of 2028 1740 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe PID 1740 wrote to memory of 2028 1740 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe PID 1740 wrote to memory of 2028 1740 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe PID 1740 wrote to memory of 2028 1740 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe PID 1740 wrote to memory of 2028 1740 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe PID 1740 wrote to memory of 2028 1740 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe PID 2028 wrote to memory of 576 2028 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe elyl.exe PID 2028 wrote to memory of 576 2028 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe elyl.exe PID 2028 wrote to memory of 576 2028 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe elyl.exe PID 2028 wrote to memory of 576 2028 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe elyl.exe PID 576 wrote to memory of 1912 576 elyl.exe elyl.exe PID 576 wrote to memory of 1912 576 elyl.exe elyl.exe PID 576 wrote to memory of 1912 576 elyl.exe elyl.exe PID 576 wrote to memory of 1912 576 elyl.exe elyl.exe PID 576 wrote to memory of 1912 576 elyl.exe elyl.exe PID 576 wrote to memory of 1912 576 elyl.exe elyl.exe PID 576 wrote to memory of 1912 576 elyl.exe elyl.exe PID 576 wrote to memory of 1912 576 elyl.exe elyl.exe PID 576 wrote to memory of 1912 576 elyl.exe elyl.exe PID 1912 wrote to memory of 1120 1912 elyl.exe taskhost.exe PID 1912 wrote to memory of 1120 1912 elyl.exe taskhost.exe PID 1912 wrote to memory of 1120 1912 elyl.exe taskhost.exe PID 1912 wrote to memory of 1120 1912 elyl.exe taskhost.exe PID 1912 wrote to memory of 1120 1912 elyl.exe taskhost.exe PID 1912 wrote to memory of 1172 1912 elyl.exe Dwm.exe PID 1912 wrote to memory of 1172 1912 elyl.exe Dwm.exe PID 1912 wrote to memory of 1172 1912 elyl.exe Dwm.exe PID 1912 wrote to memory of 1172 1912 elyl.exe Dwm.exe PID 1912 wrote to memory of 1172 1912 elyl.exe Dwm.exe PID 1912 wrote to memory of 1204 1912 elyl.exe Explorer.EXE PID 1912 wrote to memory of 1204 1912 elyl.exe Explorer.EXE PID 1912 wrote to memory of 1204 1912 elyl.exe Explorer.EXE PID 1912 wrote to memory of 1204 1912 elyl.exe Explorer.EXE PID 1912 wrote to memory of 1204 1912 elyl.exe Explorer.EXE PID 1912 wrote to memory of 2028 1912 elyl.exe 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe PID 1912 wrote to memory of 2028 1912 elyl.exe 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe PID 1912 wrote to memory of 2028 1912 elyl.exe 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe PID 1912 wrote to memory of 2028 1912 elyl.exe 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe PID 1912 wrote to memory of 2028 1912 elyl.exe 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe PID 2028 wrote to memory of 616 2028 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe cmd.exe PID 2028 wrote to memory of 616 2028 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe cmd.exe PID 2028 wrote to memory of 616 2028 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe cmd.exe PID 2028 wrote to memory of 616 2028 1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe cmd.exe PID 1912 wrote to memory of 616 1912 elyl.exe cmd.exe PID 1912 wrote to memory of 616 1912 elyl.exe cmd.exe PID 1912 wrote to memory of 616 1912 elyl.exe cmd.exe PID 1912 wrote to memory of 616 1912 elyl.exe cmd.exe PID 1912 wrote to memory of 616 1912 elyl.exe cmd.exe PID 1912 wrote to memory of 1072 1912 elyl.exe DllHost.exe PID 1912 wrote to memory of 1072 1912 elyl.exe DllHost.exe PID 1912 wrote to memory of 1072 1912 elyl.exe DllHost.exe PID 1912 wrote to memory of 1072 1912 elyl.exe DllHost.exe PID 1912 wrote to memory of 1072 1912 elyl.exe DllHost.exe PID 1912 wrote to memory of 880 1912 elyl.exe DllHost.exe PID 1912 wrote to memory of 880 1912 elyl.exe DllHost.exe PID 1912 wrote to memory of 880 1912 elyl.exe DllHost.exe PID 1912 wrote to memory of 880 1912 elyl.exe DllHost.exe PID 1912 wrote to memory of 880 1912 elyl.exe DllHost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe"C:\Users\Admin\AppData\Local\Temp\1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe"C:\Users\Admin\AppData\Local\Temp\1bf1e0b4de0df75aa6508dc992d5b51493c16b1cc44d8147f6d58d2de582a52b.exe"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\Lusawi\elyl.exe"C:\Users\Admin\AppData\Roaming\Lusawi\elyl.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Roaming\Lusawi\elyl.exe"C:\Users\Admin\AppData\Roaming\Lusawi\elyl.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1912
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpfcfd075c.bat"4⤵
- Deletes itself
PID:616
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1072
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:880
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5e1730168f338c1a97c728f404341bfba
SHA172c646ef66f1df4d30b14578c21b92ec513a0879
SHA256570b3448134849b8652900c739fbf420556094fee88b42cc0faaabe2e6ccebff
SHA512527723fc3a1c298f9d827958a822bfdd71ffb3de5458723126fc8526e72d1c2d4bde2837df10c84a822c79bfe4b6115a781609df0867619c9e9f0439d970c783
-
Filesize
483KB
MD5304ed2319d3852c087c15de6c65102a1
SHA13cf4df83e22dd34c0af2323a042a44630d1e40d1
SHA256bca0475ec69122a0f823638cbfe4815efbc6ae49f75316d8c6bebd877acfb07c
SHA5122d70bcc33bca3eb900aa600fdcadc611a24caaf870a82c19ca9a73fead987cdf91cd7efeba734d6a49262b226a3844c4a58c45f79ab289139844e9aa4a210339
-
Filesize
483KB
MD5304ed2319d3852c087c15de6c65102a1
SHA13cf4df83e22dd34c0af2323a042a44630d1e40d1
SHA256bca0475ec69122a0f823638cbfe4815efbc6ae49f75316d8c6bebd877acfb07c
SHA5122d70bcc33bca3eb900aa600fdcadc611a24caaf870a82c19ca9a73fead987cdf91cd7efeba734d6a49262b226a3844c4a58c45f79ab289139844e9aa4a210339
-
Filesize
483KB
MD5304ed2319d3852c087c15de6c65102a1
SHA13cf4df83e22dd34c0af2323a042a44630d1e40d1
SHA256bca0475ec69122a0f823638cbfe4815efbc6ae49f75316d8c6bebd877acfb07c
SHA5122d70bcc33bca3eb900aa600fdcadc611a24caaf870a82c19ca9a73fead987cdf91cd7efeba734d6a49262b226a3844c4a58c45f79ab289139844e9aa4a210339
-
Filesize
483KB
MD5304ed2319d3852c087c15de6c65102a1
SHA13cf4df83e22dd34c0af2323a042a44630d1e40d1
SHA256bca0475ec69122a0f823638cbfe4815efbc6ae49f75316d8c6bebd877acfb07c
SHA5122d70bcc33bca3eb900aa600fdcadc611a24caaf870a82c19ca9a73fead987cdf91cd7efeba734d6a49262b226a3844c4a58c45f79ab289139844e9aa4a210339