Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 08:07
Static task
static1
Behavioral task
behavioral1
Sample
2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe
Resource
win10v2004-20220812-en
General
-
Target
2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe
-
Size
391KB
-
MD5
8d075f98d22c930bd92b5d9f01899fe6
-
SHA1
b38a61958617c13bcdca9956e05b4cf5b1ca6dc2
-
SHA256
2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937
-
SHA512
3a684bcbb084b3c77b934f9411ab59f4fa0000f407f2fa3b9b39cf8acdcdfe3873da7231f7ef8f50574746517e34427e756b806db24d61a1122759a274c98dc9
-
SSDEEP
6144:XAmQQ7/pjykp5+BV8EAEKd1vgmFv6KZf7iMcQCJwvAynaN0mHU766t2EUHEm1:XZ7/RpsV8EAXIc66fa+AyI07dikC
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
kyof.exekyof.exepid process 2032 kyof.exe 2000 kyof.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 320 cmd.exe -
Loads dropped DLL 3 IoCs
Processes:
2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exekyof.exepid process 1732 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe 1732 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe 2032 kyof.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
kyof.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run kyof.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kyof = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Urer\\kyof.exe" kyof.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exekyof.exedescription pid process target process PID 1208 set thread context of 1732 1208 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe PID 2032 set thread context of 2000 2032 kyof.exe kyof.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exekyof.exepid process 1732 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe 2000 kyof.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exekyof.exekyof.exedescription pid process target process PID 1208 wrote to memory of 1732 1208 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe PID 1208 wrote to memory of 1732 1208 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe PID 1208 wrote to memory of 1732 1208 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe PID 1208 wrote to memory of 1732 1208 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe PID 1208 wrote to memory of 1732 1208 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe PID 1208 wrote to memory of 1732 1208 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe PID 1208 wrote to memory of 1732 1208 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe PID 1208 wrote to memory of 1732 1208 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe PID 1208 wrote to memory of 1732 1208 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe PID 1208 wrote to memory of 1732 1208 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe PID 1732 wrote to memory of 2032 1732 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe kyof.exe PID 1732 wrote to memory of 2032 1732 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe kyof.exe PID 1732 wrote to memory of 2032 1732 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe kyof.exe PID 1732 wrote to memory of 2032 1732 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe kyof.exe PID 2032 wrote to memory of 2000 2032 kyof.exe kyof.exe PID 2032 wrote to memory of 2000 2032 kyof.exe kyof.exe PID 2032 wrote to memory of 2000 2032 kyof.exe kyof.exe PID 2032 wrote to memory of 2000 2032 kyof.exe kyof.exe PID 2032 wrote to memory of 2000 2032 kyof.exe kyof.exe PID 2032 wrote to memory of 2000 2032 kyof.exe kyof.exe PID 2032 wrote to memory of 2000 2032 kyof.exe kyof.exe PID 2032 wrote to memory of 2000 2032 kyof.exe kyof.exe PID 2032 wrote to memory of 2000 2032 kyof.exe kyof.exe PID 2032 wrote to memory of 2000 2032 kyof.exe kyof.exe PID 1732 wrote to memory of 320 1732 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe cmd.exe PID 1732 wrote to memory of 320 1732 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe cmd.exe PID 1732 wrote to memory of 320 1732 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe cmd.exe PID 1732 wrote to memory of 320 1732 2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe cmd.exe PID 2000 wrote to memory of 1256 2000 kyof.exe taskhost.exe PID 2000 wrote to memory of 1256 2000 kyof.exe taskhost.exe PID 2000 wrote to memory of 1256 2000 kyof.exe taskhost.exe PID 2000 wrote to memory of 1256 2000 kyof.exe taskhost.exe PID 2000 wrote to memory of 1256 2000 kyof.exe taskhost.exe PID 2000 wrote to memory of 1332 2000 kyof.exe Dwm.exe PID 2000 wrote to memory of 1332 2000 kyof.exe Dwm.exe PID 2000 wrote to memory of 1332 2000 kyof.exe Dwm.exe PID 2000 wrote to memory of 1332 2000 kyof.exe Dwm.exe PID 2000 wrote to memory of 1332 2000 kyof.exe Dwm.exe PID 2000 wrote to memory of 1388 2000 kyof.exe Explorer.EXE PID 2000 wrote to memory of 1388 2000 kyof.exe Explorer.EXE PID 2000 wrote to memory of 1388 2000 kyof.exe Explorer.EXE PID 2000 wrote to memory of 1388 2000 kyof.exe Explorer.EXE PID 2000 wrote to memory of 1388 2000 kyof.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe"C:\Users\Admin\AppData\Local\Temp\2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe"C:\Users\Admin\AppData\Local\Temp\2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Urer\kyof.exe"C:\Users\Admin\AppData\Local\Temp\Urer\kyof.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Urer\kyof.exe"C:\Users\Admin\AppData\Local\Temp\Urer\kyof.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BUZE2F7.bat"4⤵
- Deletes itself
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\BUZE2F7.batFilesize
276B
MD57f80c67b85ead391904115ec14c450c9
SHA131dc23e6f8c9f01985b6309afd54a6deeeb11dd9
SHA25684946c43e5ad67bf09cbfd2c07755fcb70b42b6a06a8ffe3eb0a30659ffb8f0f
SHA512f5ad12397d4937c1482d70f7a29b9c8d3bb325b5975958c87fb0ac0f14f8d9e31d42124ab1af125e8f71c8546d171b760abf0cd335bf471f1a88b8aa91627a9e
-
C:\Users\Admin\AppData\Local\Temp\Urer\kyof.exeFilesize
391KB
MD59a7da5fbc594e963219d2b10336a402c
SHA177abc254a12aade2f330e38c5c6a7715f5b8a1d1
SHA25699291ea00e0a9fdbf746dd2f8eebeffdc05476979833d7b480562ea091d713a5
SHA512c70773f38d7b1a45e5217570053513259187244b19b9a0b9ff266a3312b04884d55d19959b9f61001a3baaf8f08fc84f90243840fc7d1efb16d465298aee23d5
-
C:\Users\Admin\AppData\Local\Temp\Urer\kyof.exeFilesize
391KB
MD59a7da5fbc594e963219d2b10336a402c
SHA177abc254a12aade2f330e38c5c6a7715f5b8a1d1
SHA25699291ea00e0a9fdbf746dd2f8eebeffdc05476979833d7b480562ea091d713a5
SHA512c70773f38d7b1a45e5217570053513259187244b19b9a0b9ff266a3312b04884d55d19959b9f61001a3baaf8f08fc84f90243840fc7d1efb16d465298aee23d5
-
C:\Users\Admin\AppData\Local\Temp\Urer\kyof.exeFilesize
391KB
MD59a7da5fbc594e963219d2b10336a402c
SHA177abc254a12aade2f330e38c5c6a7715f5b8a1d1
SHA25699291ea00e0a9fdbf746dd2f8eebeffdc05476979833d7b480562ea091d713a5
SHA512c70773f38d7b1a45e5217570053513259187244b19b9a0b9ff266a3312b04884d55d19959b9f61001a3baaf8f08fc84f90243840fc7d1efb16d465298aee23d5
-
\Users\Admin\AppData\Local\Temp\Urer\kyof.exeFilesize
391KB
MD59a7da5fbc594e963219d2b10336a402c
SHA177abc254a12aade2f330e38c5c6a7715f5b8a1d1
SHA25699291ea00e0a9fdbf746dd2f8eebeffdc05476979833d7b480562ea091d713a5
SHA512c70773f38d7b1a45e5217570053513259187244b19b9a0b9ff266a3312b04884d55d19959b9f61001a3baaf8f08fc84f90243840fc7d1efb16d465298aee23d5
-
\Users\Admin\AppData\Local\Temp\Urer\kyof.exeFilesize
391KB
MD59a7da5fbc594e963219d2b10336a402c
SHA177abc254a12aade2f330e38c5c6a7715f5b8a1d1
SHA25699291ea00e0a9fdbf746dd2f8eebeffdc05476979833d7b480562ea091d713a5
SHA512c70773f38d7b1a45e5217570053513259187244b19b9a0b9ff266a3312b04884d55d19959b9f61001a3baaf8f08fc84f90243840fc7d1efb16d465298aee23d5
-
\Users\Admin\AppData\Local\Temp\Urer\kyof.exeFilesize
391KB
MD59a7da5fbc594e963219d2b10336a402c
SHA177abc254a12aade2f330e38c5c6a7715f5b8a1d1
SHA25699291ea00e0a9fdbf746dd2f8eebeffdc05476979833d7b480562ea091d713a5
SHA512c70773f38d7b1a45e5217570053513259187244b19b9a0b9ff266a3312b04884d55d19959b9f61001a3baaf8f08fc84f90243840fc7d1efb16d465298aee23d5
-
memory/320-92-0x0000000000000000-mapping.dmp
-
memory/1208-67-0x0000000074A50000-0x0000000074FFB000-memory.dmpFilesize
5.7MB
-
memory/1208-54-0x0000000075D01000-0x0000000075D03000-memory.dmpFilesize
8KB
-
memory/1256-99-0x0000000001BA0000-0x0000000001BE2000-memory.dmpFilesize
264KB
-
memory/1256-100-0x0000000001BA0000-0x0000000001BE2000-memory.dmpFilesize
264KB
-
memory/1256-98-0x0000000001BA0000-0x0000000001BE2000-memory.dmpFilesize
264KB
-
memory/1256-97-0x0000000001BA0000-0x0000000001BE2000-memory.dmpFilesize
264KB
-
memory/1332-106-0x0000000000230000-0x0000000000272000-memory.dmpFilesize
264KB
-
memory/1332-103-0x0000000000230000-0x0000000000272000-memory.dmpFilesize
264KB
-
memory/1332-104-0x0000000000230000-0x0000000000272000-memory.dmpFilesize
264KB
-
memory/1332-105-0x0000000000230000-0x0000000000272000-memory.dmpFilesize
264KB
-
memory/1388-109-0x0000000002A50000-0x0000000002A92000-memory.dmpFilesize
264KB
-
memory/1388-110-0x0000000002A50000-0x0000000002A92000-memory.dmpFilesize
264KB
-
memory/1388-111-0x0000000002A50000-0x0000000002A92000-memory.dmpFilesize
264KB
-
memory/1388-112-0x0000000002A50000-0x0000000002A92000-memory.dmpFilesize
264KB
-
memory/1732-66-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/1732-56-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/1732-89-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/1732-55-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/1732-93-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/1732-58-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/1732-69-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/1732-68-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/1732-64-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/1732-63-0x000000000030E47E-mapping.dmp
-
memory/1732-61-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/1732-59-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2000-85-0x000000000118E47E-mapping.dmp
-
memory/2000-113-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2000-114-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2032-72-0x0000000000000000-mapping.dmp
-
memory/2032-88-0x00000000744A0000-0x0000000074A4B000-memory.dmpFilesize
5.7MB