Analysis
-
max time kernel
171s -
max time network
216s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 17:35
Static task
static1
Behavioral task
behavioral1
Sample
cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe
Resource
win10v2004-20220812-en
General
-
Target
cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe
-
Size
304KB
-
MD5
603803a45e8b51d6738666c64fe51966
-
SHA1
2c909fba9e435cf75633b0c069177d7e42c3a2c2
-
SHA256
cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3
-
SHA512
1fc76af148d21e6fedef4383d3b17a4658a8f10c341a534356ae9958534cb2385e7d35e840a55c2c933481357d11bd8b49e8abe74edf40ab0a34e604231b17f2
-
SSDEEP
6144:o6wdmt+S8iXtGZ4FtTfK1bcfwK8jNCm69EfzSWDHhftl1KQi9gSnZoAI1GNk:HPC4tFFticoxz69E+GV0JZoPGm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 948 wyevn.exe -
Deletes itself 1 IoCs
pid Process 1936 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run wyevn.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{A87A45C8-3774-AD4D-8524-3978BFBA1A65} = "C:\\Users\\Admin\\AppData\\Roaming\\Igfei\\wyevn.exe" wyevn.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1796 set thread context of 1936 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe 29 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe 948 wyevn.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1796 wrote to memory of 948 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe 28 PID 1796 wrote to memory of 948 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe 28 PID 1796 wrote to memory of 948 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe 28 PID 1796 wrote to memory of 948 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe 28 PID 948 wrote to memory of 1124 948 wyevn.exe 14 PID 948 wrote to memory of 1124 948 wyevn.exe 14 PID 948 wrote to memory of 1124 948 wyevn.exe 14 PID 948 wrote to memory of 1124 948 wyevn.exe 14 PID 948 wrote to memory of 1124 948 wyevn.exe 14 PID 948 wrote to memory of 1184 948 wyevn.exe 13 PID 948 wrote to memory of 1184 948 wyevn.exe 13 PID 948 wrote to memory of 1184 948 wyevn.exe 13 PID 948 wrote to memory of 1184 948 wyevn.exe 13 PID 948 wrote to memory of 1184 948 wyevn.exe 13 PID 948 wrote to memory of 1272 948 wyevn.exe 12 PID 948 wrote to memory of 1272 948 wyevn.exe 12 PID 948 wrote to memory of 1272 948 wyevn.exe 12 PID 948 wrote to memory of 1272 948 wyevn.exe 12 PID 948 wrote to memory of 1272 948 wyevn.exe 12 PID 948 wrote to memory of 1796 948 wyevn.exe 10 PID 948 wrote to memory of 1796 948 wyevn.exe 10 PID 948 wrote to memory of 1796 948 wyevn.exe 10 PID 948 wrote to memory of 1796 948 wyevn.exe 10 PID 948 wrote to memory of 1796 948 wyevn.exe 10 PID 1796 wrote to memory of 1936 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe 29 PID 1796 wrote to memory of 1936 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe 29 PID 1796 wrote to memory of 1936 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe 29 PID 1796 wrote to memory of 1936 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe 29 PID 1796 wrote to memory of 1936 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe 29 PID 1796 wrote to memory of 1936 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe 29 PID 1796 wrote to memory of 1936 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe 29 PID 1796 wrote to memory of 1936 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe 29 PID 1796 wrote to memory of 1936 1796 cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe 29 PID 948 wrote to memory of 1996 948 wyevn.exe 31 PID 948 wrote to memory of 1996 948 wyevn.exe 31 PID 948 wrote to memory of 1996 948 wyevn.exe 31 PID 948 wrote to memory of 1996 948 wyevn.exe 31 PID 948 wrote to memory of 1996 948 wyevn.exe 31 PID 948 wrote to memory of 1552 948 wyevn.exe 32 PID 948 wrote to memory of 1552 948 wyevn.exe 32 PID 948 wrote to memory of 1552 948 wyevn.exe 32 PID 948 wrote to memory of 1552 948 wyevn.exe 32 PID 948 wrote to memory of 1552 948 wyevn.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe"C:\Users\Admin\AppData\Local\Temp\cbef9ded11aa13ffefb50ff55a814b4c811c7f622046477e5cb25c54c5d7dff3.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Roaming\Igfei\wyevn.exe"C:\Users\Admin\AppData\Roaming\Igfei\wyevn.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:948
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpcd0c7f6b.bat"2⤵
- Deletes itself
PID:1936
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1996
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1552
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD59cf40a1de07da6851994056e54344858
SHA161a785998226b298cf4537d2f8758fb6d10f14ce
SHA2568acde324d3aae8364848b3349774897e2008af0d284583835ecf1eb1cef19e45
SHA51246a75929b0eeabf858f6e41e71697dc08c459da1db81e0bc5934580e4f7cae4f33926431dadf05c79fdc291c4890653bd5fd9a219b62b13951ab86951ba1f34d
-
Filesize
304KB
MD5ec247b5ce0dce9baeebdf8dd716714e4
SHA16c31c45a69634be8cae9e2f7a71b44f0e36bfb0f
SHA25659ea8b0acd93ac4cee62f014e8b4a315ab0d6133357c5d6920af5e077b0f4e54
SHA512bc20767adb0122470217f439a4837bbcd33fc1381166aa21be9df78d13786e73d08da7245eda4bb08fb2d41d50647e57c84a93fdd1c5831f12af96f3faaedb2d
-
Filesize
304KB
MD5ec247b5ce0dce9baeebdf8dd716714e4
SHA16c31c45a69634be8cae9e2f7a71b44f0e36bfb0f
SHA25659ea8b0acd93ac4cee62f014e8b4a315ab0d6133357c5d6920af5e077b0f4e54
SHA512bc20767adb0122470217f439a4837bbcd33fc1381166aa21be9df78d13786e73d08da7245eda4bb08fb2d41d50647e57c84a93fdd1c5831f12af96f3faaedb2d
-
Filesize
304KB
MD5ec247b5ce0dce9baeebdf8dd716714e4
SHA16c31c45a69634be8cae9e2f7a71b44f0e36bfb0f
SHA25659ea8b0acd93ac4cee62f014e8b4a315ab0d6133357c5d6920af5e077b0f4e54
SHA512bc20767adb0122470217f439a4837bbcd33fc1381166aa21be9df78d13786e73d08da7245eda4bb08fb2d41d50647e57c84a93fdd1c5831f12af96f3faaedb2d
-
Filesize
304KB
MD5ec247b5ce0dce9baeebdf8dd716714e4
SHA16c31c45a69634be8cae9e2f7a71b44f0e36bfb0f
SHA25659ea8b0acd93ac4cee62f014e8b4a315ab0d6133357c5d6920af5e077b0f4e54
SHA512bc20767adb0122470217f439a4837bbcd33fc1381166aa21be9df78d13786e73d08da7245eda4bb08fb2d41d50647e57c84a93fdd1c5831f12af96f3faaedb2d