Analysis

  • max time kernel
    181s
  • max time network
    224s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 19:10

General

  • Target

    b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe

  • Size

    302KB

  • MD5

    25ace6f96888caa26b843ac16061b626

  • SHA1

    ea875cc62abaf8527a6f1d034ad26268222a34cf

  • SHA256

    b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00

  • SHA512

    9d08baa9f6b5c470e07fd4985909d3b8c9ffc5c4b5c37c85edb6d0b5c1de01e2f5cb5d38b4ce9759729300d9ed5b64361e26cc944186b6053cae0c963ba64890

  • SSDEEP

    6144:TxRdXYjNyhhv0yOtL8XaszVIML7uezJDWy1VK7ni:TxR8yUyOtQaeRDc7i

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe
        "C:\Users\Admin\AppData\Local\Temp\b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:340
        • C:\Users\Admin\AppData\Roaming\Kizaz\ysycvo.exe
          "C:\Users\Admin\AppData\Roaming\Kizaz\ysycvo.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:1164
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp9c18343d.bat"
          3⤵
          • Deletes itself
          PID:1496
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1172
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1116

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp9c18343d.bat

          Filesize

          307B

          MD5

          6b35f9f718f18903c38b82081aac1177

          SHA1

          43f80a18c5d420039f3ed0398462b84bafccf1aa

          SHA256

          2b2dccf0c486ff070ea622eb69d01d05f535e5fea9a4c24fecb8fef4d089325c

          SHA512

          f625028d0fd6feaf88dc33e34a05956be863cb69cd60a27d6d80f9e26d6680010657e80a2e871ed090e90faa9170aa0bb2ee47c0d29b78cc0153c8805b436370

        • C:\Users\Admin\AppData\Roaming\Kizaz\ysycvo.exe

          Filesize

          302KB

          MD5

          9cd175ebe8feeb1a8620ba6895150b55

          SHA1

          17a3450f6178d05af4025ef0a6e4deb071115103

          SHA256

          55806c871cebf4de8a702f89e302b357b93e227556ded78633345332655414f8

          SHA512

          6019e16e8ce3ae5a522cc12586a1457be60ea61c364de8297a4875495b7605099138823fd94051007233ee46e6c048ad857d6a7d26d110954422cad1427f571e

        • C:\Users\Admin\AppData\Roaming\Kizaz\ysycvo.exe

          Filesize

          302KB

          MD5

          9cd175ebe8feeb1a8620ba6895150b55

          SHA1

          17a3450f6178d05af4025ef0a6e4deb071115103

          SHA256

          55806c871cebf4de8a702f89e302b357b93e227556ded78633345332655414f8

          SHA512

          6019e16e8ce3ae5a522cc12586a1457be60ea61c364de8297a4875495b7605099138823fd94051007233ee46e6c048ad857d6a7d26d110954422cad1427f571e

        • \Users\Admin\AppData\Roaming\Kizaz\ysycvo.exe

          Filesize

          302KB

          MD5

          9cd175ebe8feeb1a8620ba6895150b55

          SHA1

          17a3450f6178d05af4025ef0a6e4deb071115103

          SHA256

          55806c871cebf4de8a702f89e302b357b93e227556ded78633345332655414f8

          SHA512

          6019e16e8ce3ae5a522cc12586a1457be60ea61c364de8297a4875495b7605099138823fd94051007233ee46e6c048ad857d6a7d26d110954422cad1427f571e

        • memory/340-102-0x0000000001BD0000-0x0000000001C17000-memory.dmp

          Filesize

          284KB

        • memory/340-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/340-92-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/340-57-0x0000000000400000-0x0000000000447000-memory.dmp

          Filesize

          284KB

        • memory/340-56-0x0000000000400000-0x0000000000447000-memory.dmp

          Filesize

          284KB

        • memory/340-91-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/340-103-0x0000000000400000-0x0000000000447000-memory.dmp

          Filesize

          284KB

        • memory/340-93-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/340-58-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/340-84-0x0000000001CB0000-0x0000000001CF7000-memory.dmp

          Filesize

          284KB

        • memory/340-89-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/340-87-0x0000000001CB0000-0x0000000001CF7000-memory.dmp

          Filesize

          284KB

        • memory/340-88-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/340-85-0x0000000001CB0000-0x0000000001CF7000-memory.dmp

          Filesize

          284KB

        • memory/340-86-0x0000000001CB0000-0x0000000001CF7000-memory.dmp

          Filesize

          284KB

        • memory/340-55-0x0000000001BD0000-0x0000000001C17000-memory.dmp

          Filesize

          284KB

        • memory/340-54-0x0000000074FD1000-0x0000000074FD3000-memory.dmp

          Filesize

          8KB

        • memory/340-104-0x0000000001CB0000-0x0000000001CF7000-memory.dmp

          Filesize

          284KB

        • memory/1116-67-0x0000000001C80000-0x0000000001CC7000-memory.dmp

          Filesize

          284KB

        • memory/1116-68-0x0000000001C80000-0x0000000001CC7000-memory.dmp

          Filesize

          284KB

        • memory/1116-66-0x0000000001C80000-0x0000000001CC7000-memory.dmp

          Filesize

          284KB

        • memory/1116-69-0x0000000001C80000-0x0000000001CC7000-memory.dmp

          Filesize

          284KB

        • memory/1116-64-0x0000000001C80000-0x0000000001CC7000-memory.dmp

          Filesize

          284KB

        • memory/1164-115-0x0000000000320000-0x0000000000367000-memory.dmp

          Filesize

          284KB

        • memory/1164-116-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1164-117-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1172-74-0x00000000001A0000-0x00000000001E7000-memory.dmp

          Filesize

          284KB

        • memory/1172-72-0x00000000001A0000-0x00000000001E7000-memory.dmp

          Filesize

          284KB

        • memory/1172-73-0x00000000001A0000-0x00000000001E7000-memory.dmp

          Filesize

          284KB

        • memory/1172-75-0x00000000001A0000-0x00000000001E7000-memory.dmp

          Filesize

          284KB

        • memory/1196-79-0x0000000002AA0000-0x0000000002AE7000-memory.dmp

          Filesize

          284KB

        • memory/1196-80-0x0000000002AA0000-0x0000000002AE7000-memory.dmp

          Filesize

          284KB

        • memory/1196-78-0x0000000002AA0000-0x0000000002AE7000-memory.dmp

          Filesize

          284KB

        • memory/1196-81-0x0000000002AA0000-0x0000000002AE7000-memory.dmp

          Filesize

          284KB

        • memory/1496-110-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1496-106-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1496-107-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1496-108-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1496-109-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1496-111-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1496-112-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1496-96-0x0000000000050000-0x0000000000097000-memory.dmp

          Filesize

          284KB

        • memory/1496-114-0x0000000000050000-0x0000000000097000-memory.dmp

          Filesize

          284KB

        • memory/1496-100-0x0000000000050000-0x0000000000097000-memory.dmp

          Filesize

          284KB

        • memory/1496-99-0x0000000000050000-0x0000000000097000-memory.dmp

          Filesize

          284KB

        • memory/1496-98-0x0000000000050000-0x0000000000097000-memory.dmp

          Filesize

          284KB