Analysis
-
max time kernel
151s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 00:31
Static task
static1
Behavioral task
behavioral1
Sample
9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe
Resource
win10v2004-20221111-en
General
-
Target
9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe
-
Size
188KB
-
MD5
7d86378363873f8407d57a33eb9e6286
-
SHA1
54bc85e50ef9911881a84dddd6bb790fac7ee3f5
-
SHA256
9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9
-
SHA512
37c8f1c17d5235f1ca72e20d161a71f062416c83669c5038fb90ed272a1487c75bee752d8ec90d5f5b570fa935885ad4ba07d815f7ec8641530f3518416d7280
-
SSDEEP
3072:9bOoRdeIj4VJby2sALRBtoU8W5Hg1neD2XxNfoyA4SD9edV6p6wotWSjzlR+05j:9qoR8OqRBiM5HgFeCXxNfoSSD9ebwoWK
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1820 pyzez.exe 904 pyzez.exe 1524 pyzez.exe -
Deletes itself 1 IoCs
pid Process 1540 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 944 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 944 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\Currentversion\Run pyzez.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C6D0104A-27C3-93E7-1F5B-8665A690EF33} = "C:\\Users\\Admin\\AppData\\Roaming\\Ageq\\pyzez.exe" pyzez.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1384 set thread context of 684 1384 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 27 PID 684 set thread context of 944 684 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 28 PID 1820 set thread context of 904 1820 pyzez.exe 30 PID 904 set thread context of 1524 904 pyzez.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe 1524 pyzez.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 944 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe Token: SeSecurityPrivilege 944 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe Token: SeSecurityPrivilege 944 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 684 1384 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 27 PID 1384 wrote to memory of 684 1384 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 27 PID 1384 wrote to memory of 684 1384 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 27 PID 1384 wrote to memory of 684 1384 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 27 PID 1384 wrote to memory of 684 1384 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 27 PID 1384 wrote to memory of 684 1384 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 27 PID 1384 wrote to memory of 684 1384 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 27 PID 1384 wrote to memory of 684 1384 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 27 PID 1384 wrote to memory of 684 1384 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 27 PID 1384 wrote to memory of 684 1384 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 27 PID 1384 wrote to memory of 684 1384 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 27 PID 684 wrote to memory of 944 684 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 28 PID 684 wrote to memory of 944 684 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 28 PID 684 wrote to memory of 944 684 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 28 PID 684 wrote to memory of 944 684 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 28 PID 684 wrote to memory of 944 684 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 28 PID 684 wrote to memory of 944 684 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 28 PID 684 wrote to memory of 944 684 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 28 PID 684 wrote to memory of 944 684 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 28 PID 684 wrote to memory of 944 684 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 28 PID 944 wrote to memory of 1820 944 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 29 PID 944 wrote to memory of 1820 944 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 29 PID 944 wrote to memory of 1820 944 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 29 PID 944 wrote to memory of 1820 944 9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe 29 PID 1820 wrote to memory of 904 1820 pyzez.exe 30 PID 1820 wrote to memory of 904 1820 pyzez.exe 30 PID 1820 wrote to memory of 904 1820 pyzez.exe 30 PID 1820 wrote to memory of 904 1820 pyzez.exe 30 PID 1820 wrote to memory of 904 1820 pyzez.exe 30 PID 1820 wrote to memory of 904 1820 pyzez.exe 30 PID 1820 wrote to memory of 904 1820 pyzez.exe 30 PID 1820 wrote to memory of 904 1820 pyzez.exe 30 PID 1820 wrote to memory of 904 1820 pyzez.exe 30 PID 1820 wrote to memory of 904 1820 pyzez.exe 30 PID 1820 wrote to memory of 904 1820 pyzez.exe 30 PID 904 wrote to memory of 1524 904 pyzez.exe 31 PID 904 wrote to memory of 1524 904 pyzez.exe 31 PID 904 wrote to memory of 1524 904 pyzez.exe 31 PID 904 wrote to memory of 1524 904 pyzez.exe 31 PID 904 wrote to memory of 1524 904 pyzez.exe 31 PID 904 wrote to memory of 1524 904 pyzez.exe 31 PID 904 wrote to memory of 1524 904 pyzez.exe 31 PID 904 wrote to memory of 1524 904 pyzez.exe 31 PID 904 wrote to memory of 1524 904 pyzez.exe 31 PID 1524 wrote to memory of 1120 1524 pyzez.exe 9 PID 1524 wrote to memory of 1120 1524 pyzez.exe 9 PID 1524 wrote to memory of 1120 1524 pyzez.exe 9 PID 1524 wrote to memory of 1120 1524 pyzez.exe 9 PID 1524 wrote to memory of 1120 1524 pyzez.exe 9 PID 1524 wrote to memory of 1184 1524 pyzez.exe 13 PID 1524 wrote to memory of 1184 1524 pyzez.exe 13 PID 1524 wrote to memory of 1184 1524 pyzez.exe 13 PID 1524 wrote to memory of 1184 1524 pyzez.exe 13 PID 1524 wrote to memory of 1184 1524 pyzez.exe 13 PID 1524 wrote to memory of 1248 1524 pyzez.exe 12 PID 1524 wrote to memory of 1248 1524 pyzez.exe 12 PID 1524 wrote to memory of 1248 1524 pyzez.exe 12 PID 1524 wrote to memory of 1248 1524 pyzez.exe 12 PID 1524 wrote to memory of 1248 1524 pyzez.exe 12 PID 1524 wrote to memory of 944 1524 pyzez.exe 28 PID 1524 wrote to memory of 944 1524 pyzez.exe 28 PID 1524 wrote to memory of 944 1524 pyzez.exe 28 PID 1524 wrote to memory of 944 1524 pyzez.exe 28 PID 1524 wrote to memory of 944 1524 pyzez.exe 28
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe"C:\Users\Admin\AppData\Local\Temp\9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe"C:\Users\Admin\AppData\Local\Temp\9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe"C:\Users\Admin\AppData\Local\Temp\9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe"4⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe"C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe"C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe"C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1524
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf70f7884.bat"5⤵
- Deletes itself
PID:1540
-
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-528012913-1864590366-10739497831914409153945424018-6475679751626915202-742156840"1⤵PID:1360
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1300
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1752
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5a604128fae75aadeb5601431f84f8fdb
SHA1570487d4356b8e4ede34eae79e3403334b1a888d
SHA2569f0c922b0eb8b1104fc4146b2023aeb10a96c201925342edd4e104a63e709199
SHA512c2ec5d029937705471c0f728c5a5166218b83b271f27b73153b58c48a3a01ef2714cb2344fa31548d8d62c18080f72e41198fd4cdc5224385bf5f2cc3c6df1e7
-
Filesize
188KB
MD5aca3b1fcf7fe30bae946b8da47f9fadc
SHA155d0dd491aec2e521654154a5779e12fb9fef645
SHA256def8c64ef0ae3aad76beccd132775531e656bc33c84ac7815094ac9fd913f3d7
SHA5124526af618055506106d8a0c75111ba5797824a68ca4983e60888e696aae06502bb763e0b6a31b46dc2d3d08b83ee108785457e815e60ce6dd6eb0f35bfef2cd7
-
Filesize
188KB
MD5aca3b1fcf7fe30bae946b8da47f9fadc
SHA155d0dd491aec2e521654154a5779e12fb9fef645
SHA256def8c64ef0ae3aad76beccd132775531e656bc33c84ac7815094ac9fd913f3d7
SHA5124526af618055506106d8a0c75111ba5797824a68ca4983e60888e696aae06502bb763e0b6a31b46dc2d3d08b83ee108785457e815e60ce6dd6eb0f35bfef2cd7
-
Filesize
188KB
MD5aca3b1fcf7fe30bae946b8da47f9fadc
SHA155d0dd491aec2e521654154a5779e12fb9fef645
SHA256def8c64ef0ae3aad76beccd132775531e656bc33c84ac7815094ac9fd913f3d7
SHA5124526af618055506106d8a0c75111ba5797824a68ca4983e60888e696aae06502bb763e0b6a31b46dc2d3d08b83ee108785457e815e60ce6dd6eb0f35bfef2cd7
-
Filesize
188KB
MD5aca3b1fcf7fe30bae946b8da47f9fadc
SHA155d0dd491aec2e521654154a5779e12fb9fef645
SHA256def8c64ef0ae3aad76beccd132775531e656bc33c84ac7815094ac9fd913f3d7
SHA5124526af618055506106d8a0c75111ba5797824a68ca4983e60888e696aae06502bb763e0b6a31b46dc2d3d08b83ee108785457e815e60ce6dd6eb0f35bfef2cd7
-
Filesize
398B
MD584c84f7a0cfa9dbea4e2cf508e9f23a1
SHA1a83283b7c6e0b82ceac763921206ba900fa202bb
SHA256b955a8f9c917fcfdca5edd09577e636e44111b2ef5e674cb6979d7d22ac9afd1
SHA5127985fe84977ef984f3fed75f597a5c58af3dd602aef6c6d10fa075625f96ab5a33ed687cf55dde86c8848f0d60abcd507de4b563a61e01dbf41424695cef2b2c
-
Filesize
188KB
MD5aca3b1fcf7fe30bae946b8da47f9fadc
SHA155d0dd491aec2e521654154a5779e12fb9fef645
SHA256def8c64ef0ae3aad76beccd132775531e656bc33c84ac7815094ac9fd913f3d7
SHA5124526af618055506106d8a0c75111ba5797824a68ca4983e60888e696aae06502bb763e0b6a31b46dc2d3d08b83ee108785457e815e60ce6dd6eb0f35bfef2cd7
-
Filesize
188KB
MD5aca3b1fcf7fe30bae946b8da47f9fadc
SHA155d0dd491aec2e521654154a5779e12fb9fef645
SHA256def8c64ef0ae3aad76beccd132775531e656bc33c84ac7815094ac9fd913f3d7
SHA5124526af618055506106d8a0c75111ba5797824a68ca4983e60888e696aae06502bb763e0b6a31b46dc2d3d08b83ee108785457e815e60ce6dd6eb0f35bfef2cd7