Analysis

  • max time kernel
    204s
  • max time network
    209s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 04:37

General

  • Target

    15b2e980e1d6df1df0918d5c504eafd037900aab654215847735f46b5900b5dc.exe

  • Size

    600KB

  • MD5

    832782e8825d602ab1f56ef028a3a09f

  • SHA1

    cdf038350ccef100415629ff7a8b17d5501c39a5

  • SHA256

    15b2e980e1d6df1df0918d5c504eafd037900aab654215847735f46b5900b5dc

  • SHA512

    dfe2c6af9adcd4237f23ac8d9b2e9688ab49c778c5403f008ec96ad96a3db3031b869adb12897037ccf0ec2d8fe99a699efb5e5c4ef5143f083747d7d0f76a9f

  • SSDEEP

    6144:xKkuO2YCt6BXyo04xS3O4F/6xOb2FxY2Fh12RrJJUzvtuQZ7TOLWxYV/8LTLEvZz:x4l3OJxOUShezvMQZy+26GZ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1104
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1208
        • C:\Users\Admin\AppData\Local\Temp\15b2e980e1d6df1df0918d5c504eafd037900aab654215847735f46b5900b5dc.exe
          "C:\Users\Admin\AppData\Local\Temp\15b2e980e1d6df1df0918d5c504eafd037900aab654215847735f46b5900b5dc.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1788
          • C:\Windows\SysWOW64\CMD.exe
            "CMD"
            3⤵
              PID:1664
            • C:\Windows\SysWOW64\CMD.exe
              "CMD"
              3⤵
                PID:1308
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\\AppLaunch.exe"
                3⤵
                  PID:1384
                • C:\Users\Admin\AppData\Local\Temp\15b2e980e1d6df1df0918d5c504eafd037900aab654215847735f46b5900b5dc.exe
                  "C:\Users\Admin\AppData\Local\Temp\15b2e980e1d6df1df0918d5c504eafd037900aab654215847735f46b5900b5dc.exe"
                  3⤵
                    PID:620
                  • C:\Users\Admin\AppData\Local\Temp\15b2e980e1d6df1df0918d5c504eafd037900aab654215847735f46b5900b5dc.exe
                    "C:\Users\Admin\AppData\Local\Temp\15b2e980e1d6df1df0918d5c504eafd037900aab654215847735f46b5900b5dc.exe"
                    3⤵
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1960
                    • C:\Users\Admin\AppData\Roaming\Vaitpa\ryago.exe
                      "C:\Users\Admin\AppData\Roaming\Vaitpa\ryago.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:428
                      • C:\Windows\SysWOW64\CMD.exe
                        "CMD"
                        5⤵
                          PID:1868
                        • C:\Windows\SysWOW64\CMD.exe
                          "CMD"
                          5⤵
                            PID:2024
                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\\AppLaunch.exe"
                            5⤵
                              PID:1692
                            • C:\Users\Admin\AppData\Roaming\Vaitpa\ryago.exe
                              "C:\Users\Admin\AppData\Roaming\Vaitpa\ryago.exe"
                              5⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1880
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpfc16bd5c.bat"
                            4⤵
                            • Deletes itself
                            PID:1920
                    • C:\Windows\system32\Dwm.exe
                      "C:\Windows\system32\Dwm.exe"
                      1⤵
                        PID:1176
                      • C:\Windows\system32\DllHost.exe
                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                        1⤵
                          PID:1248
                        • C:\Windows\system32\DllHost.exe
                          C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                          1⤵
                            PID:2044
                          • C:\Windows\system32\DllHost.exe
                            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                            1⤵
                              PID:1696

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6
                              Filesize

                              5B

                              MD5

                              5bfa51f3a417b98e7443eca90fc94703

                              SHA1

                              8c015d80b8a23f780bdd215dc842b0f5551f63bd

                              SHA256

                              bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

                              SHA512

                              4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F
                              Filesize

                              834B

                              MD5

                              2f9af8e0d783cfa432c7041713c8f5ee

                              SHA1

                              974e325ade4fd9e3f450913e8269c78d1ef4836a

                              SHA256

                              b4c71719b03d24adf1b8d89707cdf20e2b0be78c58686d78c340da6fd3a00eb3

                              SHA512

                              3ccb5b22dd0cb7e4841b4979d1c0aa6e921925cc9a187c88d67d6e2f19285ed4acc30424c7e481b61e215bdae8af9d4bdc9c17fada508ff0385cd9d456968c72

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9A19ADAD9D098E039450ABBEDD5616EB_500F57EEC9E626F78EE636E0FA5E7AFB
                              Filesize

                              1KB

                              MD5

                              975da2aaca74674764b7ea4c9a46ee7b

                              SHA1

                              b0229072db3f1e15b6394ad1421e65e48a12a801

                              SHA256

                              b84f10911c85d2fb4ce3c9bc488d782e5f6ed970f5ac320758c6323fbfe7ae96

                              SHA512

                              68ef6db79116a2f4d14fc28177b5b62988ca510259995fb86cac0e82b3230949207750bf0f87cda8497783be2642521d8ebfc0c28e647cbc07d480881a219d21

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6
                              Filesize

                              404B

                              MD5

                              9b99dde5b79a6094e28c9d4eb257296e

                              SHA1

                              00aee3873784173438ac68f80217b5d2e991174b

                              SHA256

                              45252d91529412a8bd9059244f72d054759451c295d0c01ac5c48f83f4278190

                              SHA512

                              2d15e1477134a2923cab63080e177ce9946f6d486edafb5fabf3c5de6545e446f23ae1b9a45615c455fe202e4c9f5e0bf34405572a8008274b0802e5afe123db

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F
                              Filesize

                              188B

                              MD5

                              d8e087bf9fbd91b56402745c4361658d

                              SHA1

                              f89c0b4df8d1ade996d68fc12fba4150ae29d7de

                              SHA256

                              c7b38ec747cbfc83a932c58e6f632bcb9fdef91168669fb4161782323693b237

                              SHA512

                              a74cae814a3b2eeca099c480dd7dbf1199f024ddff4e91e4d5d81fbf6d1434521f4203b9cebb4e7d10ec161f86d2e7c2002e51b431899c601a2faade9b07b630

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                              Filesize

                              342B

                              MD5

                              42188094caa9087f1d525b5337bb16fe

                              SHA1

                              817bb8dd6c5a750e5ab886b2da1372461e04614e

                              SHA256

                              74be786765e885f1b5c1884a52b9381d340e225999dce4a61719c17aeb57a749

                              SHA512

                              7c7b9801cb3ea4e09d7bdd43157f3e695386c7aeb32a5658545ae4984f4b67e848ba6b972ea2f852417e0a2dd7d1efabac9a89ed0a68b1c00bf59d31ccb1165d

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9A19ADAD9D098E039450ABBEDD5616EB_500F57EEC9E626F78EE636E0FA5E7AFB
                              Filesize

                              394B

                              MD5

                              96c84bad42d0a7d7770bdd4bb5d030a1

                              SHA1

                              df8bd0bca25f8f5532616d3693a6fd2547b2dd09

                              SHA256

                              3387671a50d6e49ddeda85b554e35a15ae39671e0ad35fe028480cfbbc45cd27

                              SHA512

                              53a3a9644a78537561dcddd5371a762a6c4f2fdc3ec2787f7bdf08a4b98f73fee067333272836ba5c694d0b198a2d787359285f26c691f76c7901caefb91d9eb

                            • C:\Users\Admin\AppData\Local\Temp\tmpfc16bd5c.bat
                              Filesize

                              307B

                              MD5

                              a78c5e69233b2e70900b80a438f9cb94

                              SHA1

                              9e7675f366bb4641155c3e53f21d4206231589e2

                              SHA256

                              0df327cb98e74e2e8f475335961de21419533ae978f013f10b308e183e84d599

                              SHA512

                              1141f4a1c28f314149e06baf3d4ae8070854fe79d47599eb5e40d32610ae222534d242fd9888391e12bbc429c3c8a54bcff2054e713a3726d56e5098fc0cf83b

                            • C:\Users\Admin\AppData\Roaming\Vaitpa\ryago.exe
                              Filesize

                              600KB

                              MD5

                              26972fc6fdcfd3c37fd6b0c11cdef6ec

                              SHA1

                              4822cc56f3c51e04db6a47a32d99e9e54be76211

                              SHA256

                              86eca8dcafcb5a5db1001ea5ec2cf42baea21f13ff6933e3da1d4575e444d4cb

                              SHA512

                              5dee7ccb8612e94c87f10aa03fa7598b7163b3776c1ea414bebb607aec48b2e552983c24869d901e01c17ae4849c0954dc77127eeb56dbf124a3fd10cf69fe02

                            • C:\Users\Admin\AppData\Roaming\Vaitpa\ryago.exe
                              Filesize

                              600KB

                              MD5

                              26972fc6fdcfd3c37fd6b0c11cdef6ec

                              SHA1

                              4822cc56f3c51e04db6a47a32d99e9e54be76211

                              SHA256

                              86eca8dcafcb5a5db1001ea5ec2cf42baea21f13ff6933e3da1d4575e444d4cb

                              SHA512

                              5dee7ccb8612e94c87f10aa03fa7598b7163b3776c1ea414bebb607aec48b2e552983c24869d901e01c17ae4849c0954dc77127eeb56dbf124a3fd10cf69fe02

                            • C:\Users\Admin\AppData\Roaming\Vaitpa\ryago.exe
                              Filesize

                              600KB

                              MD5

                              26972fc6fdcfd3c37fd6b0c11cdef6ec

                              SHA1

                              4822cc56f3c51e04db6a47a32d99e9e54be76211

                              SHA256

                              86eca8dcafcb5a5db1001ea5ec2cf42baea21f13ff6933e3da1d4575e444d4cb

                              SHA512

                              5dee7ccb8612e94c87f10aa03fa7598b7163b3776c1ea414bebb607aec48b2e552983c24869d901e01c17ae4849c0954dc77127eeb56dbf124a3fd10cf69fe02

                            • \Users\Admin\AppData\Roaming\Vaitpa\ryago.exe
                              Filesize

                              600KB

                              MD5

                              26972fc6fdcfd3c37fd6b0c11cdef6ec

                              SHA1

                              4822cc56f3c51e04db6a47a32d99e9e54be76211

                              SHA256

                              86eca8dcafcb5a5db1001ea5ec2cf42baea21f13ff6933e3da1d4575e444d4cb

                              SHA512

                              5dee7ccb8612e94c87f10aa03fa7598b7163b3776c1ea414bebb607aec48b2e552983c24869d901e01c17ae4849c0954dc77127eeb56dbf124a3fd10cf69fe02

                            • memory/428-138-0x0000000074D80000-0x000000007532B000-memory.dmp
                              Filesize

                              5.7MB

                            • memory/428-127-0x0000000074D80000-0x000000007532B000-memory.dmp
                              Filesize

                              5.7MB

                            • memory/428-97-0x0000000000000000-mapping.dmp
                            • memory/1308-58-0x0000000000000000-mapping.dmp
                            • memory/1384-73-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1384-59-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1384-60-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1384-62-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1384-63-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1384-65-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1384-66-0x000000000042B055-mapping.dmp
                            • memory/1384-69-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1384-71-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1384-75-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1664-57-0x0000000000000000-mapping.dmp
                            • memory/1692-117-0x000000000042B055-mapping.dmp
                            • memory/1692-126-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1692-124-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1692-122-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1788-56-0x0000000074E00000-0x00000000753AB000-memory.dmp
                              Filesize

                              5.7MB

                            • memory/1788-55-0x0000000074E00000-0x00000000753AB000-memory.dmp
                              Filesize

                              5.7MB

                            • memory/1788-85-0x0000000074E00000-0x00000000753AB000-memory.dmp
                              Filesize

                              5.7MB

                            • memory/1788-54-0x00000000760D1000-0x00000000760D3000-memory.dmp
                              Filesize

                              8KB

                            • memory/1868-108-0x0000000000000000-mapping.dmp
                            • memory/1880-135-0x000000000042B055-mapping.dmp
                            • memory/1880-179-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1880-160-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1880-144-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1880-141-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1920-143-0x0000000000000000-mapping.dmp
                            • memory/1960-92-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1960-87-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1960-83-0x000000000042B055-mapping.dmp
                            • memory/1960-95-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1960-94-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1960-145-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1960-93-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1960-88-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/1960-90-0x0000000000400000-0x000000000043B000-memory.dmp
                              Filesize

                              236KB

                            • memory/2024-109-0x0000000000000000-mapping.dmp