Analysis

  • max time kernel
    151s
  • max time network
    116s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 00:31

General

  • Target

    9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe

  • Size

    188KB

  • MD5

    7d86378363873f8407d57a33eb9e6286

  • SHA1

    54bc85e50ef9911881a84dddd6bb790fac7ee3f5

  • SHA256

    9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9

  • SHA512

    37c8f1c17d5235f1ca72e20d161a71f062416c83669c5038fb90ed272a1487c75bee752d8ec90d5f5b570fa935885ad4ba07d815f7ec8641530f3518416d7280

  • SSDEEP

    3072:9bOoRdeIj4VJby2sALRBtoU8W5Hg1neD2XxNfoyA4SD9edV6p6wotWSjzlR+05j:9qoR8OqRBiM5HgFeCXxNfoSSD9ebwoWK

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1120
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1248
        • C:\Users\Admin\AppData\Local\Temp\9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe
          "C:\Users\Admin\AppData\Local\Temp\9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1384
          • C:\Users\Admin\AppData\Local\Temp\9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe
            "C:\Users\Admin\AppData\Local\Temp\9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe"
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:684
            • C:\Users\Admin\AppData\Local\Temp\9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe
              "C:\Users\Admin\AppData\Local\Temp\9cddcaf749612ebb51e6d0d89ec8809b918ecabd879f9f8bedb61deba54ab4c9.exe"
              4⤵
              • Loads dropped DLL
              • Modifies Internet Explorer settings
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:944
              • C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe
                "C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1820
                • C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe
                  "C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:904
                  • C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe
                    "C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe"
                    7⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:1524
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf70f7884.bat"
                5⤵
                • Deletes itself
                PID:1540
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1184
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "-528012913-1864590366-10739497831914409153945424018-6475679751626915202-742156840"
          1⤵
            PID:1360
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:1300
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
                PID:1752
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:1228

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\tmpf70f7884.bat

                  Filesize

                  307B

                  MD5

                  a604128fae75aadeb5601431f84f8fdb

                  SHA1

                  570487d4356b8e4ede34eae79e3403334b1a888d

                  SHA256

                  9f0c922b0eb8b1104fc4146b2023aeb10a96c201925342edd4e104a63e709199

                  SHA512

                  c2ec5d029937705471c0f728c5a5166218b83b271f27b73153b58c48a3a01ef2714cb2344fa31548d8d62c18080f72e41198fd4cdc5224385bf5f2cc3c6df1e7

                • C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe

                  Filesize

                  188KB

                  MD5

                  aca3b1fcf7fe30bae946b8da47f9fadc

                  SHA1

                  55d0dd491aec2e521654154a5779e12fb9fef645

                  SHA256

                  def8c64ef0ae3aad76beccd132775531e656bc33c84ac7815094ac9fd913f3d7

                  SHA512

                  4526af618055506106d8a0c75111ba5797824a68ca4983e60888e696aae06502bb763e0b6a31b46dc2d3d08b83ee108785457e815e60ce6dd6eb0f35bfef2cd7

                • C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe

                  Filesize

                  188KB

                  MD5

                  aca3b1fcf7fe30bae946b8da47f9fadc

                  SHA1

                  55d0dd491aec2e521654154a5779e12fb9fef645

                  SHA256

                  def8c64ef0ae3aad76beccd132775531e656bc33c84ac7815094ac9fd913f3d7

                  SHA512

                  4526af618055506106d8a0c75111ba5797824a68ca4983e60888e696aae06502bb763e0b6a31b46dc2d3d08b83ee108785457e815e60ce6dd6eb0f35bfef2cd7

                • C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe

                  Filesize

                  188KB

                  MD5

                  aca3b1fcf7fe30bae946b8da47f9fadc

                  SHA1

                  55d0dd491aec2e521654154a5779e12fb9fef645

                  SHA256

                  def8c64ef0ae3aad76beccd132775531e656bc33c84ac7815094ac9fd913f3d7

                  SHA512

                  4526af618055506106d8a0c75111ba5797824a68ca4983e60888e696aae06502bb763e0b6a31b46dc2d3d08b83ee108785457e815e60ce6dd6eb0f35bfef2cd7

                • C:\Users\Admin\AppData\Roaming\Ageq\pyzez.exe

                  Filesize

                  188KB

                  MD5

                  aca3b1fcf7fe30bae946b8da47f9fadc

                  SHA1

                  55d0dd491aec2e521654154a5779e12fb9fef645

                  SHA256

                  def8c64ef0ae3aad76beccd132775531e656bc33c84ac7815094ac9fd913f3d7

                  SHA512

                  4526af618055506106d8a0c75111ba5797824a68ca4983e60888e696aae06502bb763e0b6a31b46dc2d3d08b83ee108785457e815e60ce6dd6eb0f35bfef2cd7

                • C:\Users\Admin\AppData\Roaming\Liat\sybiu.ekm

                  Filesize

                  398B

                  MD5

                  84c84f7a0cfa9dbea4e2cf508e9f23a1

                  SHA1

                  a83283b7c6e0b82ceac763921206ba900fa202bb

                  SHA256

                  b955a8f9c917fcfdca5edd09577e636e44111b2ef5e674cb6979d7d22ac9afd1

                  SHA512

                  7985fe84977ef984f3fed75f597a5c58af3dd602aef6c6d10fa075625f96ab5a33ed687cf55dde86c8848f0d60abcd507de4b563a61e01dbf41424695cef2b2c

                • \Users\Admin\AppData\Roaming\Ageq\pyzez.exe

                  Filesize

                  188KB

                  MD5

                  aca3b1fcf7fe30bae946b8da47f9fadc

                  SHA1

                  55d0dd491aec2e521654154a5779e12fb9fef645

                  SHA256

                  def8c64ef0ae3aad76beccd132775531e656bc33c84ac7815094ac9fd913f3d7

                  SHA512

                  4526af618055506106d8a0c75111ba5797824a68ca4983e60888e696aae06502bb763e0b6a31b46dc2d3d08b83ee108785457e815e60ce6dd6eb0f35bfef2cd7

                • \Users\Admin\AppData\Roaming\Ageq\pyzez.exe

                  Filesize

                  188KB

                  MD5

                  aca3b1fcf7fe30bae946b8da47f9fadc

                  SHA1

                  55d0dd491aec2e521654154a5779e12fb9fef645

                  SHA256

                  def8c64ef0ae3aad76beccd132775531e656bc33c84ac7815094ac9fd913f3d7

                  SHA512

                  4526af618055506106d8a0c75111ba5797824a68ca4983e60888e696aae06502bb763e0b6a31b46dc2d3d08b83ee108785457e815e60ce6dd6eb0f35bfef2cd7

                • memory/684-60-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/684-65-0x0000000076701000-0x0000000076703000-memory.dmp

                  Filesize

                  8KB

                • memory/684-66-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/684-62-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/684-54-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/684-63-0x0000000000401110-mapping.dmp

                • memory/684-75-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/684-59-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/684-58-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/684-57-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/684-55-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/904-108-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/904-94-0x0000000000401110-mapping.dmp

                • memory/944-70-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/944-139-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/944-79-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/944-78-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/944-74-0x000000000041D470-mapping.dmp

                • memory/944-73-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/944-71-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/944-67-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/944-132-0x0000000000370000-0x0000000000397000-memory.dmp

                  Filesize

                  156KB

                • memory/944-136-0x0000000000370000-0x0000000000384000-memory.dmp

                  Filesize

                  80KB

                • memory/944-131-0x0000000000370000-0x0000000000397000-memory.dmp

                  Filesize

                  156KB

                • memory/944-141-0x0000000000370000-0x0000000000384000-memory.dmp

                  Filesize

                  80KB

                • memory/944-68-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1120-116-0x0000000001C80000-0x0000000001CA7000-memory.dmp

                  Filesize

                  156KB

                • memory/1120-114-0x0000000001C80000-0x0000000001CA7000-memory.dmp

                  Filesize

                  156KB

                • memory/1120-113-0x0000000001C80000-0x0000000001CA7000-memory.dmp

                  Filesize

                  156KB

                • memory/1120-115-0x0000000001C80000-0x0000000001CA7000-memory.dmp

                  Filesize

                  156KB

                • memory/1184-120-0x0000000001CB0000-0x0000000001CD7000-memory.dmp

                  Filesize

                  156KB

                • memory/1184-121-0x0000000001CB0000-0x0000000001CD7000-memory.dmp

                  Filesize

                  156KB

                • memory/1184-122-0x0000000001CB0000-0x0000000001CD7000-memory.dmp

                  Filesize

                  156KB

                • memory/1184-119-0x0000000001CB0000-0x0000000001CD7000-memory.dmp

                  Filesize

                  156KB

                • memory/1248-127-0x0000000002580000-0x00000000025A7000-memory.dmp

                  Filesize

                  156KB

                • memory/1248-128-0x0000000002580000-0x00000000025A7000-memory.dmp

                  Filesize

                  156KB

                • memory/1248-126-0x0000000002580000-0x00000000025A7000-memory.dmp

                  Filesize

                  156KB

                • memory/1248-125-0x0000000002580000-0x00000000025A7000-memory.dmp

                  Filesize

                  156KB

                • memory/1524-135-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1524-106-0x000000000041D470-mapping.dmp

                • memory/1524-161-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1540-137-0x0000000000000000-mapping.dmp

                • memory/1820-82-0x0000000000000000-mapping.dmp