Analysis
-
max time kernel
153s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 21:08
Static task
static1
Behavioral task
behavioral1
Sample
91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe
Resource
win10v2004-20221111-en
General
-
Target
91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe
-
Size
445KB
-
MD5
36c835ff6451b2b5621a7a98b6398bf5
-
SHA1
54c0619ad1b0f5ed0d10739d48a323a79582ac07
-
SHA256
91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449
-
SHA512
c95adf9ae8e8da3656a5e64281b2f9bd1f180c96fb308a7b8252fa3b7af558b1051d163e3c1fbbd5c973d5eeaef25072e98339318d4b91a7a7c7942b52bc0af3
-
SSDEEP
6144:dyJwXzalfrjZDiOpNyTKCYCNx6RX1r8nXxXIejPV4LFiP3bCWo:dyJwXelPVzpNyKCYCHUsXxjK8Vo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1048 zaynpu.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\Currentversion\Run zaynpu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{C3916187-556D-BCA0-4F67-978E82928D8C} = "C:\\Users\\Admin\\AppData\\Roaming\\Fuqu\\zaynpu.exe" zaynpu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2852 set thread context of 1836 2852 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 84 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe 1048 zaynpu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2852 wrote to memory of 1048 2852 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 83 PID 2852 wrote to memory of 1048 2852 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 83 PID 2852 wrote to memory of 1048 2852 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 83 PID 1048 wrote to memory of 2448 1048 zaynpu.exe 48 PID 1048 wrote to memory of 2448 1048 zaynpu.exe 48 PID 1048 wrote to memory of 2448 1048 zaynpu.exe 48 PID 1048 wrote to memory of 2448 1048 zaynpu.exe 48 PID 1048 wrote to memory of 2448 1048 zaynpu.exe 48 PID 1048 wrote to memory of 2464 1048 zaynpu.exe 47 PID 1048 wrote to memory of 2464 1048 zaynpu.exe 47 PID 1048 wrote to memory of 2464 1048 zaynpu.exe 47 PID 1048 wrote to memory of 2464 1048 zaynpu.exe 47 PID 1048 wrote to memory of 2464 1048 zaynpu.exe 47 PID 1048 wrote to memory of 2720 1048 zaynpu.exe 40 PID 1048 wrote to memory of 2720 1048 zaynpu.exe 40 PID 1048 wrote to memory of 2720 1048 zaynpu.exe 40 PID 1048 wrote to memory of 2720 1048 zaynpu.exe 40 PID 1048 wrote to memory of 2720 1048 zaynpu.exe 40 PID 1048 wrote to memory of 2708 1048 zaynpu.exe 38 PID 1048 wrote to memory of 2708 1048 zaynpu.exe 38 PID 1048 wrote to memory of 2708 1048 zaynpu.exe 38 PID 1048 wrote to memory of 2708 1048 zaynpu.exe 38 PID 1048 wrote to memory of 2708 1048 zaynpu.exe 38 PID 1048 wrote to memory of 2936 1048 zaynpu.exe 37 PID 1048 wrote to memory of 2936 1048 zaynpu.exe 37 PID 1048 wrote to memory of 2936 1048 zaynpu.exe 37 PID 1048 wrote to memory of 2936 1048 zaynpu.exe 37 PID 1048 wrote to memory of 2936 1048 zaynpu.exe 37 PID 1048 wrote to memory of 3260 1048 zaynpu.exe 36 PID 1048 wrote to memory of 3260 1048 zaynpu.exe 36 PID 1048 wrote to memory of 3260 1048 zaynpu.exe 36 PID 1048 wrote to memory of 3260 1048 zaynpu.exe 36 PID 1048 wrote to memory of 3260 1048 zaynpu.exe 36 PID 1048 wrote to memory of 3368 1048 zaynpu.exe 35 PID 1048 wrote to memory of 3368 1048 zaynpu.exe 35 PID 1048 wrote to memory of 3368 1048 zaynpu.exe 35 PID 1048 wrote to memory of 3368 1048 zaynpu.exe 35 PID 1048 wrote to memory of 3368 1048 zaynpu.exe 35 PID 1048 wrote to memory of 3440 1048 zaynpu.exe 11 PID 1048 wrote to memory of 3440 1048 zaynpu.exe 11 PID 1048 wrote to memory of 3440 1048 zaynpu.exe 11 PID 1048 wrote to memory of 3440 1048 zaynpu.exe 11 PID 1048 wrote to memory of 3440 1048 zaynpu.exe 11 PID 1048 wrote to memory of 3528 1048 zaynpu.exe 34 PID 1048 wrote to memory of 3528 1048 zaynpu.exe 34 PID 1048 wrote to memory of 3528 1048 zaynpu.exe 34 PID 1048 wrote to memory of 3528 1048 zaynpu.exe 34 PID 1048 wrote to memory of 3528 1048 zaynpu.exe 34 PID 1048 wrote to memory of 3756 1048 zaynpu.exe 33 PID 1048 wrote to memory of 3756 1048 zaynpu.exe 33 PID 1048 wrote to memory of 3756 1048 zaynpu.exe 33 PID 1048 wrote to memory of 3756 1048 zaynpu.exe 33 PID 1048 wrote to memory of 3756 1048 zaynpu.exe 33 PID 1048 wrote to memory of 2948 1048 zaynpu.exe 21 PID 1048 wrote to memory of 2948 1048 zaynpu.exe 21 PID 1048 wrote to memory of 2948 1048 zaynpu.exe 21 PID 1048 wrote to memory of 2948 1048 zaynpu.exe 21 PID 1048 wrote to memory of 2948 1048 zaynpu.exe 21 PID 1048 wrote to memory of 4388 1048 zaynpu.exe 16 PID 1048 wrote to memory of 4388 1048 zaynpu.exe 16 PID 1048 wrote to memory of 4388 1048 zaynpu.exe 16 PID 1048 wrote to memory of 4388 1048 zaynpu.exe 16 PID 1048 wrote to memory of 4388 1048 zaynpu.exe 16 PID 1048 wrote to memory of 1308 1048 zaynpu.exe 15
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3440
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1328
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:1308
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4388
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:2948
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3756
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3528
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3368
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:2936
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe"C:\Users\Admin\AppData\Local\Temp\91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Roaming\Fuqu\zaynpu.exe"C:\Users\Admin\AppData\Roaming\Fuqu\zaynpu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpcecc7eb0.bat"3⤵PID:1836
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2464
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2448
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:3804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD578fec7921443ee7467fffd882c2a90ea
SHA161368875b95c392510c9ae84c0e6bb00180da968
SHA25696cb3487c654858bcafcc6f9cfeda3ae106c86aae0773b3a5efbc8de73a51f70
SHA512f99d37c52282536900c6dd315fb323bdfff6a2359748b328937b5a3886088c8750e2796b1857e8602d7b9eb5671a182a2623d5f3775afa00214277bc852c4c23
-
Filesize
445KB
MD5fe4951d53cd7366a53331ec5024de61a
SHA1ff6ce5e8584a05e4d94fbcd4218281e7a71a500e
SHA256cd0ec3579bb564ad3e57d1e8b91f77751ed4f8194adc6329de820910446fe66e
SHA512aa7d0ec2485dfce0da5fa51169f5b5514f45cd7bb141b6461b70491398d66dbad3b1f7b5a2362ea595a01ba86adc24e5b9f3b235fccca912c8510820a23605e6
-
Filesize
445KB
MD5fe4951d53cd7366a53331ec5024de61a
SHA1ff6ce5e8584a05e4d94fbcd4218281e7a71a500e
SHA256cd0ec3579bb564ad3e57d1e8b91f77751ed4f8194adc6329de820910446fe66e
SHA512aa7d0ec2485dfce0da5fa51169f5b5514f45cd7bb141b6461b70491398d66dbad3b1f7b5a2362ea595a01ba86adc24e5b9f3b235fccca912c8510820a23605e6