Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe
Resource
win10v2004-20220812-en
General
-
Target
00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe
-
Size
303KB
-
MD5
343c424e1583ef0c5fc705028e5f21c0
-
SHA1
406549f839ec9217ffb5c4707a9e8886bdcebd14
-
SHA256
00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0
-
SHA512
fc66808713d0521afb7ea443d563ccb4657e8120684e84e5be4094c9b312d690b2c15deb320dcb4052eb09ca7a4618feee2fcc456c0aabf6e38ace6c764c6a88
-
SSDEEP
6144:vEqtgMxcJUHMknMIDWUHMgmNVWSMtx2c8gdE3Z2rQDyk6x:vEqtgMGJwM6MIvjmNRMn2cRTk5W
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1644 qaem.exe -
Deletes itself 1 IoCs
pid Process 1784 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qaem = "C:\\Users\\Admin\\AppData\\Roaming\\Ezycta\\qaem.exe" qaem.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run qaem.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1452 set thread context of 1784 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe 27 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe 1644 qaem.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1644 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe 26 PID 1452 wrote to memory of 1644 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe 26 PID 1452 wrote to memory of 1644 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe 26 PID 1452 wrote to memory of 1644 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe 26 PID 1644 wrote to memory of 1132 1644 qaem.exe 16 PID 1644 wrote to memory of 1132 1644 qaem.exe 16 PID 1644 wrote to memory of 1132 1644 qaem.exe 16 PID 1644 wrote to memory of 1132 1644 qaem.exe 16 PID 1644 wrote to memory of 1132 1644 qaem.exe 16 PID 1644 wrote to memory of 1236 1644 qaem.exe 15 PID 1644 wrote to memory of 1236 1644 qaem.exe 15 PID 1644 wrote to memory of 1236 1644 qaem.exe 15 PID 1644 wrote to memory of 1236 1644 qaem.exe 15 PID 1644 wrote to memory of 1236 1644 qaem.exe 15 PID 1644 wrote to memory of 1268 1644 qaem.exe 13 PID 1644 wrote to memory of 1268 1644 qaem.exe 13 PID 1644 wrote to memory of 1268 1644 qaem.exe 13 PID 1644 wrote to memory of 1268 1644 qaem.exe 13 PID 1644 wrote to memory of 1268 1644 qaem.exe 13 PID 1644 wrote to memory of 1452 1644 qaem.exe 14 PID 1644 wrote to memory of 1452 1644 qaem.exe 14 PID 1644 wrote to memory of 1452 1644 qaem.exe 14 PID 1644 wrote to memory of 1452 1644 qaem.exe 14 PID 1644 wrote to memory of 1452 1644 qaem.exe 14 PID 1452 wrote to memory of 1784 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe 27 PID 1452 wrote to memory of 1784 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe 27 PID 1452 wrote to memory of 1784 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe 27 PID 1452 wrote to memory of 1784 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe 27 PID 1452 wrote to memory of 1784 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe 27 PID 1452 wrote to memory of 1784 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe 27 PID 1452 wrote to memory of 1784 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe 27 PID 1452 wrote to memory of 1784 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe 27 PID 1452 wrote to memory of 1784 1452 00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe 27
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe"C:\Users\Admin\AppData\Local\Temp\00a7e6fd8384a8ad8efa60785da8809299732d424dfd5a74ccfc52ea9d8dd7e0.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Roaming\Ezycta\qaem.exe"C:\Users\Admin\AppData\Roaming\Ezycta\qaem.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1644
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\ZYECD1.bat"3⤵
- Deletes itself
PID:1784
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1236
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD56b4b448bf3982384c8cb5fcf13b47d6e
SHA116538ec9b2513758ecfa4d8c966dd3b269d12a4e
SHA2567081eebad972818950f106f35ea6eae4e9f4d812456d53ff5fa4a52621fa9e60
SHA5123a040a900e767d191630f841a1f3d4482a3382bf320c9711ab5dfe8b6871bbf474dbe128c0cf20f83c38451fe3f9b4002d221c4c2def7afea6bd76a95434991e
-
Filesize
303KB
MD5b7396c8c04e7952cd38cf10d5820e184
SHA1ed97a23f2824cc059592a1c17045925312c79b0b
SHA2568fee846cd67ec3c49b5d945cd010bf6ef92036f16e2f1ef7e20e4401e1b169d5
SHA5126447184047fe58964d480103ddd547c38ba5e0a7970a3f25e64dbdf0aebfa52039ccbc0785a7641f964e28a41203deb9ae813ecbd2205d1367de0b0ff55a21a2
-
Filesize
303KB
MD5b7396c8c04e7952cd38cf10d5820e184
SHA1ed97a23f2824cc059592a1c17045925312c79b0b
SHA2568fee846cd67ec3c49b5d945cd010bf6ef92036f16e2f1ef7e20e4401e1b169d5
SHA5126447184047fe58964d480103ddd547c38ba5e0a7970a3f25e64dbdf0aebfa52039ccbc0785a7641f964e28a41203deb9ae813ecbd2205d1367de0b0ff55a21a2
-
Filesize
303KB
MD5b7396c8c04e7952cd38cf10d5820e184
SHA1ed97a23f2824cc059592a1c17045925312c79b0b
SHA2568fee846cd67ec3c49b5d945cd010bf6ef92036f16e2f1ef7e20e4401e1b169d5
SHA5126447184047fe58964d480103ddd547c38ba5e0a7970a3f25e64dbdf0aebfa52039ccbc0785a7641f964e28a41203deb9ae813ecbd2205d1367de0b0ff55a21a2
-
Filesize
303KB
MD5b7396c8c04e7952cd38cf10d5820e184
SHA1ed97a23f2824cc059592a1c17045925312c79b0b
SHA2568fee846cd67ec3c49b5d945cd010bf6ef92036f16e2f1ef7e20e4401e1b169d5
SHA5126447184047fe58964d480103ddd547c38ba5e0a7970a3f25e64dbdf0aebfa52039ccbc0785a7641f964e28a41203deb9ae813ecbd2205d1367de0b0ff55a21a2