Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 22:14
Static task
static1
Behavioral task
behavioral1
Sample
81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe
Resource
win10v2004-20220812-en
General
-
Target
81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe
-
Size
241KB
-
MD5
c7c1ed4cc182307b76b3bc01253cdd06
-
SHA1
b5fda2a62e340b5e4e4ba509316c844ab885b35d
-
SHA256
81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0
-
SHA512
7d114b688c5f11d9f33951374dd10fb3eaa5fa826c3aaa042f6ff78daf9b7c02cbd2096b891cffa0fe0e6a17a7881d282c6da1caaf62e3790589fb5978844352
-
SSDEEP
3072:HDgnEdPvIvxywNCQoVeEeZaL8QwtVg6C7619nc7BSQP47n/E5pNFZHO2e0QKlPu9:scA1Cdfe4oQwtVi+TWYQQ7n/gpNTdGL
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 572 okvyt.exe 524 okvyt.exe -
Deletes itself 1 IoCs
pid Process 1228 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 988 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 988 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run okvyt.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\Currentversion\Run okvyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Vucyo = "C:\\Users\\Admin\\AppData\\Roaming\\Sali\\okvyt.exe" okvyt.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1768 set thread context of 988 1768 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 27 PID 572 set thread context of 524 572 okvyt.exe 29 -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe 524 okvyt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 988 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe Token: SeSecurityPrivilege 988 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 988 1768 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 27 PID 1768 wrote to memory of 988 1768 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 27 PID 1768 wrote to memory of 988 1768 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 27 PID 1768 wrote to memory of 988 1768 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 27 PID 1768 wrote to memory of 988 1768 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 27 PID 1768 wrote to memory of 988 1768 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 27 PID 1768 wrote to memory of 988 1768 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 27 PID 1768 wrote to memory of 988 1768 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 27 PID 1768 wrote to memory of 988 1768 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 27 PID 988 wrote to memory of 572 988 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 28 PID 988 wrote to memory of 572 988 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 28 PID 988 wrote to memory of 572 988 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 28 PID 988 wrote to memory of 572 988 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 28 PID 572 wrote to memory of 524 572 okvyt.exe 29 PID 572 wrote to memory of 524 572 okvyt.exe 29 PID 572 wrote to memory of 524 572 okvyt.exe 29 PID 572 wrote to memory of 524 572 okvyt.exe 29 PID 572 wrote to memory of 524 572 okvyt.exe 29 PID 572 wrote to memory of 524 572 okvyt.exe 29 PID 572 wrote to memory of 524 572 okvyt.exe 29 PID 572 wrote to memory of 524 572 okvyt.exe 29 PID 572 wrote to memory of 524 572 okvyt.exe 29 PID 988 wrote to memory of 1228 988 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 30 PID 988 wrote to memory of 1228 988 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 30 PID 988 wrote to memory of 1228 988 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 30 PID 988 wrote to memory of 1228 988 81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe 30 PID 524 wrote to memory of 1236 524 okvyt.exe 9 PID 524 wrote to memory of 1236 524 okvyt.exe 9 PID 524 wrote to memory of 1236 524 okvyt.exe 9 PID 524 wrote to memory of 1236 524 okvyt.exe 9 PID 524 wrote to memory of 1236 524 okvyt.exe 9 PID 524 wrote to memory of 1336 524 okvyt.exe 8 PID 524 wrote to memory of 1336 524 okvyt.exe 8 PID 524 wrote to memory of 1336 524 okvyt.exe 8 PID 524 wrote to memory of 1336 524 okvyt.exe 8 PID 524 wrote to memory of 1336 524 okvyt.exe 8 PID 524 wrote to memory of 1388 524 okvyt.exe 7 PID 524 wrote to memory of 1388 524 okvyt.exe 7 PID 524 wrote to memory of 1388 524 okvyt.exe 7 PID 524 wrote to memory of 1388 524 okvyt.exe 7 PID 524 wrote to memory of 1388 524 okvyt.exe 7 PID 524 wrote to memory of 1984 524 okvyt.exe 32 PID 524 wrote to memory of 1984 524 okvyt.exe 32 PID 524 wrote to memory of 1984 524 okvyt.exe 32 PID 524 wrote to memory of 1984 524 okvyt.exe 32 PID 524 wrote to memory of 1984 524 okvyt.exe 32 PID 524 wrote to memory of 2000 524 okvyt.exe 33 PID 524 wrote to memory of 2000 524 okvyt.exe 33 PID 524 wrote to memory of 2000 524 okvyt.exe 33 PID 524 wrote to memory of 2000 524 okvyt.exe 33 PID 524 wrote to memory of 2000 524 okvyt.exe 33 PID 524 wrote to memory of 840 524 okvyt.exe 34 PID 524 wrote to memory of 840 524 okvyt.exe 34 PID 524 wrote to memory of 840 524 okvyt.exe 34 PID 524 wrote to memory of 840 524 okvyt.exe 34 PID 524 wrote to memory of 840 524 okvyt.exe 34 PID 524 wrote to memory of 1732 524 okvyt.exe 35 PID 524 wrote to memory of 1732 524 okvyt.exe 35 PID 524 wrote to memory of 1732 524 okvyt.exe 35 PID 524 wrote to memory of 1732 524 okvyt.exe 35 PID 524 wrote to memory of 1732 524 okvyt.exe 35 PID 524 wrote to memory of 1160 524 okvyt.exe 36 PID 524 wrote to memory of 1160 524 okvyt.exe 36 PID 524 wrote to memory of 1160 524 okvyt.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe"C:\Users\Admin\AppData\Local\Temp\81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exeC:\Users\Admin\AppData\Local\Temp\81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Roaming\Sali\okvyt.exe"C:\Users\Admin\AppData\Roaming\Sali\okvyt.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Roaming\Sali\okvyt.exeC:\Users\Admin\AppData\Roaming\Sali\okvyt.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:524
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp43a7bb14.bat"4⤵
- Deletes itself
PID:1228
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1336
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1236
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1984
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2000
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:840
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1732
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1160
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:584
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5dddf08b4068b689af8ad1824f5c7e305
SHA17bd32d85a90c527741f8c51ef37e0521a56f9862
SHA25688800a76e3970ab91f6495f8c511b3e84474c5cc6851c1b0a57e4f7562cbb310
SHA512546f115f486c0ca8c8bf327fb48ea83523a2c72711090e393eab5f467746fe4fec1e31b2aba277fb62e1b29e95f73a12a2313c152e09def04b80ecdada1a0d57
-
Filesize
241KB
MD530e6891570dd52fab6158315b70a2ae4
SHA12ab24c10cf5019d5c788f48fa1e1ae1d987f3f11
SHA256fa1345fe87d3861d59b597c8fde53434cbf2745862cfe4ca88a4c64bcfbe8ad0
SHA512729a63bb538d6c4f4f633cd419dd33746edace67edd286b50fcb84b3ebf6e1946f901349760f669d3e42e86b0fddae51ef26b8334bbca42142a7d24262b63efc
-
Filesize
241KB
MD530e6891570dd52fab6158315b70a2ae4
SHA12ab24c10cf5019d5c788f48fa1e1ae1d987f3f11
SHA256fa1345fe87d3861d59b597c8fde53434cbf2745862cfe4ca88a4c64bcfbe8ad0
SHA512729a63bb538d6c4f4f633cd419dd33746edace67edd286b50fcb84b3ebf6e1946f901349760f669d3e42e86b0fddae51ef26b8334bbca42142a7d24262b63efc
-
Filesize
241KB
MD530e6891570dd52fab6158315b70a2ae4
SHA12ab24c10cf5019d5c788f48fa1e1ae1d987f3f11
SHA256fa1345fe87d3861d59b597c8fde53434cbf2745862cfe4ca88a4c64bcfbe8ad0
SHA512729a63bb538d6c4f4f633cd419dd33746edace67edd286b50fcb84b3ebf6e1946f901349760f669d3e42e86b0fddae51ef26b8334bbca42142a7d24262b63efc
-
Filesize
241KB
MD530e6891570dd52fab6158315b70a2ae4
SHA12ab24c10cf5019d5c788f48fa1e1ae1d987f3f11
SHA256fa1345fe87d3861d59b597c8fde53434cbf2745862cfe4ca88a4c64bcfbe8ad0
SHA512729a63bb538d6c4f4f633cd419dd33746edace67edd286b50fcb84b3ebf6e1946f901349760f669d3e42e86b0fddae51ef26b8334bbca42142a7d24262b63efc
-
Filesize
241KB
MD530e6891570dd52fab6158315b70a2ae4
SHA12ab24c10cf5019d5c788f48fa1e1ae1d987f3f11
SHA256fa1345fe87d3861d59b597c8fde53434cbf2745862cfe4ca88a4c64bcfbe8ad0
SHA512729a63bb538d6c4f4f633cd419dd33746edace67edd286b50fcb84b3ebf6e1946f901349760f669d3e42e86b0fddae51ef26b8334bbca42142a7d24262b63efc