Analysis
-
max time kernel
188s -
max time network
212s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe
Resource
win10v2004-20221111-en
General
-
Target
c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe
-
Size
332KB
-
MD5
199ad038c9ec251189c94b8897f2b5aa
-
SHA1
7a520b35a26de8bf87ba1eb70a9869df4141145a
-
SHA256
c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c
-
SHA512
9c68465f3cb0331898987a5a3e39ba95c1f0bb993884c5996019a78c23eb73191e9a88ba02f36b0296397b7ba1bcc28feb932d7d548ad6412b769ab65497311c
-
SSDEEP
6144:idrxd5uwI0ckSoWajQy/n5rQ52X+d4GFm/qRC:6oFoWaUyS0X+d4hqRC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3628 mytnra.exe -
resource yara_rule behavioral2/memory/3628-143-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3628-148-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3628-150-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3628-151-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3628-152-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3628-153-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3628-154-0x0000000000400000-0x0000000000446000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1448 set thread context of 3628 1448 c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe 85 -
Modifies registry key 1 TTPs 1 IoCs
pid Process 944 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3628 mytnra.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1188 1448 c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe 83 PID 1448 wrote to memory of 1188 1448 c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe 83 PID 1448 wrote to memory of 1188 1448 c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe 83 PID 1448 wrote to memory of 3628 1448 c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe 85 PID 1448 wrote to memory of 3628 1448 c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe 85 PID 1448 wrote to memory of 3628 1448 c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe 85 PID 1448 wrote to memory of 3628 1448 c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe 85 PID 1448 wrote to memory of 3628 1448 c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe 85 PID 1448 wrote to memory of 3628 1448 c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe 85 PID 1448 wrote to memory of 3628 1448 c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe 85 PID 1448 wrote to memory of 3628 1448 c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe 85 PID 1188 wrote to memory of 944 1188 cmd.exe 86 PID 1188 wrote to memory of 944 1188 cmd.exe 86 PID 1188 wrote to memory of 944 1188 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe"C:\Users\Admin\AppData\Local\Temp\c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKCU\Software\Microsoft\WindowsCurrentVersion\Run /v Microsoft /t REG_EXPAND_SZ /d C:\Users\Admin\AppData\Roaming\mytnra.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\WindowsCurrentVersion\Run /v Microsoft /t REG_EXPAND_SZ /d C:\Users\Admin\AppData\Roaming\mytnra.exe3⤵
- Modifies registry key
PID:944
-
-
-
C:\Users\Admin\AppData\Local\Temp\mytnra.exeC:\Users\Admin\AppData\Local\Temp\mytnra.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3628
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD5199ad038c9ec251189c94b8897f2b5aa
SHA17a520b35a26de8bf87ba1eb70a9869df4141145a
SHA256c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c
SHA5129c68465f3cb0331898987a5a3e39ba95c1f0bb993884c5996019a78c23eb73191e9a88ba02f36b0296397b7ba1bcc28feb932d7d548ad6412b769ab65497311c
-
Filesize
332KB
MD5199ad038c9ec251189c94b8897f2b5aa
SHA17a520b35a26de8bf87ba1eb70a9869df4141145a
SHA256c8b0120756f0bdfff7707ed61410cc23013d7e301a16c7d7e16280970da2f70c
SHA5129c68465f3cb0331898987a5a3e39ba95c1f0bb993884c5996019a78c23eb73191e9a88ba02f36b0296397b7ba1bcc28feb932d7d548ad6412b769ab65497311c