Analysis
-
max time kernel
181s -
max time network
224s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe
Resource
win10v2004-20221111-en
General
-
Target
b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe
-
Size
302KB
-
MD5
25ace6f96888caa26b843ac16061b626
-
SHA1
ea875cc62abaf8527a6f1d034ad26268222a34cf
-
SHA256
b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00
-
SHA512
9d08baa9f6b5c470e07fd4985909d3b8c9ffc5c4b5c37c85edb6d0b5c1de01e2f5cb5d38b4ce9759729300d9ed5b64361e26cc944186b6053cae0c963ba64890
-
SSDEEP
6144:TxRdXYjNyhhv0yOtL8XaszVIML7uezJDWy1VK7ni:TxR8yUyOtQaeRDc7i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1164 ysycvo.exe -
Deletes itself 1 IoCs
pid Process 1496 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\Currentversion\Run ysycvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7B2FDFC8-3774-AD4D-C411-AE4FF0968D52} = "C:\\Users\\Admin\\AppData\\Roaming\\Kizaz\\ysycvo.exe" ysycvo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 340 set thread context of 1496 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe 29 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe 1164 ysycvo.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe 1164 ysycvo.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 340 wrote to memory of 1164 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe 28 PID 340 wrote to memory of 1164 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe 28 PID 340 wrote to memory of 1164 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe 28 PID 340 wrote to memory of 1164 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe 28 PID 1164 wrote to memory of 1116 1164 ysycvo.exe 17 PID 1164 wrote to memory of 1116 1164 ysycvo.exe 17 PID 1164 wrote to memory of 1116 1164 ysycvo.exe 17 PID 1164 wrote to memory of 1116 1164 ysycvo.exe 17 PID 1164 wrote to memory of 1116 1164 ysycvo.exe 17 PID 1164 wrote to memory of 1172 1164 ysycvo.exe 16 PID 1164 wrote to memory of 1172 1164 ysycvo.exe 16 PID 1164 wrote to memory of 1172 1164 ysycvo.exe 16 PID 1164 wrote to memory of 1172 1164 ysycvo.exe 16 PID 1164 wrote to memory of 1172 1164 ysycvo.exe 16 PID 1164 wrote to memory of 1196 1164 ysycvo.exe 14 PID 1164 wrote to memory of 1196 1164 ysycvo.exe 14 PID 1164 wrote to memory of 1196 1164 ysycvo.exe 14 PID 1164 wrote to memory of 1196 1164 ysycvo.exe 14 PID 1164 wrote to memory of 1196 1164 ysycvo.exe 14 PID 1164 wrote to memory of 340 1164 ysycvo.exe 15 PID 1164 wrote to memory of 340 1164 ysycvo.exe 15 PID 1164 wrote to memory of 340 1164 ysycvo.exe 15 PID 1164 wrote to memory of 340 1164 ysycvo.exe 15 PID 1164 wrote to memory of 340 1164 ysycvo.exe 15 PID 340 wrote to memory of 1496 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe 29 PID 340 wrote to memory of 1496 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe 29 PID 340 wrote to memory of 1496 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe 29 PID 340 wrote to memory of 1496 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe 29 PID 340 wrote to memory of 1496 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe 29 PID 340 wrote to memory of 1496 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe 29 PID 340 wrote to memory of 1496 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe 29 PID 340 wrote to memory of 1496 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe 29 PID 340 wrote to memory of 1496 340 b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe"C:\Users\Admin\AppData\Local\Temp\b3f8a95d3bc6c1260e975037ce1b1078e9db5e8a62d37495d282462c5c58ea00.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Roaming\Kizaz\ysycvo.exe"C:\Users\Admin\AppData\Roaming\Kizaz\ysycvo.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1164
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp9c18343d.bat"3⤵
- Deletes itself
PID:1496
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD56b35f9f718f18903c38b82081aac1177
SHA143f80a18c5d420039f3ed0398462b84bafccf1aa
SHA2562b2dccf0c486ff070ea622eb69d01d05f535e5fea9a4c24fecb8fef4d089325c
SHA512f625028d0fd6feaf88dc33e34a05956be863cb69cd60a27d6d80f9e26d6680010657e80a2e871ed090e90faa9170aa0bb2ee47c0d29b78cc0153c8805b436370
-
Filesize
302KB
MD59cd175ebe8feeb1a8620ba6895150b55
SHA117a3450f6178d05af4025ef0a6e4deb071115103
SHA25655806c871cebf4de8a702f89e302b357b93e227556ded78633345332655414f8
SHA5126019e16e8ce3ae5a522cc12586a1457be60ea61c364de8297a4875495b7605099138823fd94051007233ee46e6c048ad857d6a7d26d110954422cad1427f571e
-
Filesize
302KB
MD59cd175ebe8feeb1a8620ba6895150b55
SHA117a3450f6178d05af4025ef0a6e4deb071115103
SHA25655806c871cebf4de8a702f89e302b357b93e227556ded78633345332655414f8
SHA5126019e16e8ce3ae5a522cc12586a1457be60ea61c364de8297a4875495b7605099138823fd94051007233ee46e6c048ad857d6a7d26d110954422cad1427f571e
-
Filesize
302KB
MD59cd175ebe8feeb1a8620ba6895150b55
SHA117a3450f6178d05af4025ef0a6e4deb071115103
SHA25655806c871cebf4de8a702f89e302b357b93e227556ded78633345332655414f8
SHA5126019e16e8ce3ae5a522cc12586a1457be60ea61c364de8297a4875495b7605099138823fd94051007233ee46e6c048ad857d6a7d26d110954422cad1427f571e