Analysis
-
max time kernel
152s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 00:13
Static task
static1
Behavioral task
behavioral1
Sample
c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe
Resource
win10v2004-20220901-en
General
-
Target
c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe
-
Size
509KB
-
MD5
f204e299cbfbfe1634e9027f91071a36
-
SHA1
5483848741d191789131d9e399862b13bdfade50
-
SHA256
c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b
-
SHA512
31648706b3da42a8f068efed80113d480e7ad709bc009ea79f142ce87a7d476eaf803651c3f67850d62ddba5c27ecb52c70db85379c4d13e236b58dd38919387
-
SSDEEP
6144:oKWnSagcHlT3xXlaOcmTo+ujGnA7vDCt3U8HRT6nWN:oKWSTcF7rFm0yCpRT6nQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1592 lyrey.exe 1488 lyrey.exe -
Deletes itself 1 IoCs
pid Process 1348 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 884 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 884 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\Currentversion\Run lyrey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qitineuk = "C:\\Users\\Admin\\AppData\\Roaming\\Oxra\\lyrey.exe" lyrey.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1980 set thread context of 884 1980 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 28 PID 1592 set thread context of 1488 1592 lyrey.exe 30 -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe 1488 lyrey.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 884 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe Token: SeSecurityPrivilege 884 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1980 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 1592 lyrey.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1980 wrote to memory of 884 1980 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 28 PID 1980 wrote to memory of 884 1980 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 28 PID 1980 wrote to memory of 884 1980 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 28 PID 1980 wrote to memory of 884 1980 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 28 PID 1980 wrote to memory of 884 1980 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 28 PID 1980 wrote to memory of 884 1980 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 28 PID 1980 wrote to memory of 884 1980 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 28 PID 1980 wrote to memory of 884 1980 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 28 PID 1980 wrote to memory of 884 1980 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 28 PID 1980 wrote to memory of 884 1980 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 28 PID 884 wrote to memory of 1592 884 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 29 PID 884 wrote to memory of 1592 884 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 29 PID 884 wrote to memory of 1592 884 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 29 PID 884 wrote to memory of 1592 884 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 29 PID 1592 wrote to memory of 1488 1592 lyrey.exe 30 PID 1592 wrote to memory of 1488 1592 lyrey.exe 30 PID 1592 wrote to memory of 1488 1592 lyrey.exe 30 PID 1592 wrote to memory of 1488 1592 lyrey.exe 30 PID 1592 wrote to memory of 1488 1592 lyrey.exe 30 PID 1592 wrote to memory of 1488 1592 lyrey.exe 30 PID 1592 wrote to memory of 1488 1592 lyrey.exe 30 PID 1592 wrote to memory of 1488 1592 lyrey.exe 30 PID 1592 wrote to memory of 1488 1592 lyrey.exe 30 PID 1592 wrote to memory of 1488 1592 lyrey.exe 30 PID 884 wrote to memory of 1348 884 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 31 PID 884 wrote to memory of 1348 884 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 31 PID 884 wrote to memory of 1348 884 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 31 PID 884 wrote to memory of 1348 884 c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe 31 PID 1488 wrote to memory of 1120 1488 lyrey.exe 16 PID 1488 wrote to memory of 1120 1488 lyrey.exe 16 PID 1488 wrote to memory of 1120 1488 lyrey.exe 16 PID 1488 wrote to memory of 1120 1488 lyrey.exe 16 PID 1488 wrote to memory of 1120 1488 lyrey.exe 16 PID 1488 wrote to memory of 1176 1488 lyrey.exe 15 PID 1488 wrote to memory of 1176 1488 lyrey.exe 15 PID 1488 wrote to memory of 1176 1488 lyrey.exe 15 PID 1488 wrote to memory of 1176 1488 lyrey.exe 15 PID 1488 wrote to memory of 1176 1488 lyrey.exe 15 PID 1488 wrote to memory of 1212 1488 lyrey.exe 14 PID 1488 wrote to memory of 1212 1488 lyrey.exe 14 PID 1488 wrote to memory of 1212 1488 lyrey.exe 14 PID 1488 wrote to memory of 1212 1488 lyrey.exe 14 PID 1488 wrote to memory of 1212 1488 lyrey.exe 14 PID 1488 wrote to memory of 1760 1488 lyrey.exe 33 PID 1488 wrote to memory of 1760 1488 lyrey.exe 33 PID 1488 wrote to memory of 1760 1488 lyrey.exe 33 PID 1488 wrote to memory of 1760 1488 lyrey.exe 33 PID 1488 wrote to memory of 1760 1488 lyrey.exe 33 PID 1488 wrote to memory of 1736 1488 lyrey.exe 34 PID 1488 wrote to memory of 1736 1488 lyrey.exe 34 PID 1488 wrote to memory of 1736 1488 lyrey.exe 34 PID 1488 wrote to memory of 1736 1488 lyrey.exe 34 PID 1488 wrote to memory of 1736 1488 lyrey.exe 34 PID 1488 wrote to memory of 764 1488 lyrey.exe 35 PID 1488 wrote to memory of 764 1488 lyrey.exe 35 PID 1488 wrote to memory of 764 1488 lyrey.exe 35 PID 1488 wrote to memory of 764 1488 lyrey.exe 35 PID 1488 wrote to memory of 764 1488 lyrey.exe 35 PID 1488 wrote to memory of 1600 1488 lyrey.exe 36 PID 1488 wrote to memory of 1600 1488 lyrey.exe 36 PID 1488 wrote to memory of 1600 1488 lyrey.exe 36 PID 1488 wrote to memory of 1600 1488 lyrey.exe 36 PID 1488 wrote to memory of 1600 1488 lyrey.exe 36 PID 1488 wrote to memory of 1688 1488 lyrey.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe"C:\Users\Admin\AppData\Local\Temp\c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe"C:\Users\Admin\AppData\Local\Temp\c33819f3242447a700cbf637c86f1b17edc86dbf996e2111dc66d622fb081d7b.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Roaming\Oxra\lyrey.exe"C:\Users\Admin\AppData\Roaming\Oxra\lyrey.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Roaming\Oxra\lyrey.exe"C:\Users\Admin\AppData\Roaming\Oxra\lyrey.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp2e45ed2e.bat"4⤵
- Deletes itself
PID:1348
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1760
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1736
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:764
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1600
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1688
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1820
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1860
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1112
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1968
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1604
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5e02e7ad277383b9a2c32af2c58ca0497
SHA1f6f103566c7c26223f8a27a6e087e52a9628fac1
SHA2568beffacf2aa817e17d7075a6b8d79ab5b6fc2f84cd54946ae67641e7cf2be448
SHA512c95aeb1c43b41c5247bc4a92ae813e6642c7a4781c243301db626179037e477d6e89c2d7c14cb36ee8c3a1d907915c5836c25a48335ab3303cd3999188c10023
-
Filesize
509KB
MD513124da44c0aa13745bee3707c6888d2
SHA13d59a62f2324ff8f10b7369aaf324d3fd59ddc21
SHA25639d9413ff1bceb92609ee8e8403d03c8196ba8a6006cd35df012ddf809a4da9a
SHA5121b1b4f539a90b28e3b1e8a464edb4f09b0104eb544d6418c14cec2ba37af6c18b350be35f98ba27442c820d959249257020ac2af933ebb3196e0d301634affaf
-
Filesize
509KB
MD513124da44c0aa13745bee3707c6888d2
SHA13d59a62f2324ff8f10b7369aaf324d3fd59ddc21
SHA25639d9413ff1bceb92609ee8e8403d03c8196ba8a6006cd35df012ddf809a4da9a
SHA5121b1b4f539a90b28e3b1e8a464edb4f09b0104eb544d6418c14cec2ba37af6c18b350be35f98ba27442c820d959249257020ac2af933ebb3196e0d301634affaf
-
Filesize
509KB
MD513124da44c0aa13745bee3707c6888d2
SHA13d59a62f2324ff8f10b7369aaf324d3fd59ddc21
SHA25639d9413ff1bceb92609ee8e8403d03c8196ba8a6006cd35df012ddf809a4da9a
SHA5121b1b4f539a90b28e3b1e8a464edb4f09b0104eb544d6418c14cec2ba37af6c18b350be35f98ba27442c820d959249257020ac2af933ebb3196e0d301634affaf
-
Filesize
509KB
MD513124da44c0aa13745bee3707c6888d2
SHA13d59a62f2324ff8f10b7369aaf324d3fd59ddc21
SHA25639d9413ff1bceb92609ee8e8403d03c8196ba8a6006cd35df012ddf809a4da9a
SHA5121b1b4f539a90b28e3b1e8a464edb4f09b0104eb544d6418c14cec2ba37af6c18b350be35f98ba27442c820d959249257020ac2af933ebb3196e0d301634affaf
-
Filesize
509KB
MD513124da44c0aa13745bee3707c6888d2
SHA13d59a62f2324ff8f10b7369aaf324d3fd59ddc21
SHA25639d9413ff1bceb92609ee8e8403d03c8196ba8a6006cd35df012ddf809a4da9a
SHA5121b1b4f539a90b28e3b1e8a464edb4f09b0104eb544d6418c14cec2ba37af6c18b350be35f98ba27442c820d959249257020ac2af933ebb3196e0d301634affaf