Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe
Resource
win10v2004-20220812-en
General
-
Target
263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe
-
Size
334KB
-
MD5
39e1e7c6097ee28645db521e1d3d231b
-
SHA1
ab5013f5e61d868ceaa762ea577b09f7bae5634c
-
SHA256
263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474
-
SHA512
82eac7addccfa7c708f08ea32846b4ecef1512d8e19d1ba62313d1788b2e024a92a5ca7429550ac7a8a8c762e721f94df96548b8c32bf1e236f28ee4b300b9a6
-
SSDEEP
6144:a3x0FVmavE0/b6rB8/Bp2sCFWPgGi3rWuPFKjj4:weF9Ewb62/z2sCF7ZpN2k
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1764 anuf.exe -
Deletes itself 1 IoCs
pid Process 2044 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run anuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Konan = "C:\\Users\\Admin\\AppData\\Roaming\\Oqyw\\anuf.exe" anuf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1768 set thread context of 2044 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\3C82544C-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe 1764 anuf.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeSecurityPrivilege 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe Token: SeSecurityPrivilege 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe Token: SeSecurityPrivilege 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe Token: SeSecurityPrivilege 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe Token: SeManageVolumePrivilege 1644 WinMail.exe Token: SeSecurityPrivilege 2044 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1644 WinMail.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 1764 anuf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1764 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 27 PID 1768 wrote to memory of 1764 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 27 PID 1768 wrote to memory of 1764 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 27 PID 1768 wrote to memory of 1764 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 27 PID 1764 wrote to memory of 1112 1764 anuf.exe 23 PID 1764 wrote to memory of 1112 1764 anuf.exe 23 PID 1764 wrote to memory of 1112 1764 anuf.exe 23 PID 1764 wrote to memory of 1112 1764 anuf.exe 23 PID 1764 wrote to memory of 1112 1764 anuf.exe 23 PID 1764 wrote to memory of 1176 1764 anuf.exe 22 PID 1764 wrote to memory of 1176 1764 anuf.exe 22 PID 1764 wrote to memory of 1176 1764 anuf.exe 22 PID 1764 wrote to memory of 1176 1764 anuf.exe 22 PID 1764 wrote to memory of 1176 1764 anuf.exe 22 PID 1764 wrote to memory of 1204 1764 anuf.exe 21 PID 1764 wrote to memory of 1204 1764 anuf.exe 21 PID 1764 wrote to memory of 1204 1764 anuf.exe 21 PID 1764 wrote to memory of 1204 1764 anuf.exe 21 PID 1764 wrote to memory of 1204 1764 anuf.exe 21 PID 1764 wrote to memory of 1768 1764 anuf.exe 26 PID 1764 wrote to memory of 1768 1764 anuf.exe 26 PID 1764 wrote to memory of 1768 1764 anuf.exe 26 PID 1764 wrote to memory of 1768 1764 anuf.exe 26 PID 1764 wrote to memory of 1768 1764 anuf.exe 26 PID 1764 wrote to memory of 1644 1764 anuf.exe 28 PID 1764 wrote to memory of 1644 1764 anuf.exe 28 PID 1764 wrote to memory of 1644 1764 anuf.exe 28 PID 1764 wrote to memory of 1644 1764 anuf.exe 28 PID 1764 wrote to memory of 1644 1764 anuf.exe 28 PID 1768 wrote to memory of 2044 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 29 PID 1768 wrote to memory of 2044 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 29 PID 1768 wrote to memory of 2044 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 29 PID 1768 wrote to memory of 2044 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 29 PID 1768 wrote to memory of 2044 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 29 PID 1768 wrote to memory of 2044 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 29 PID 1768 wrote to memory of 2044 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 29 PID 1768 wrote to memory of 2044 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 29 PID 1768 wrote to memory of 2044 1768 263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe 29 PID 1764 wrote to memory of 580 1764 anuf.exe 30 PID 1764 wrote to memory of 580 1764 anuf.exe 30 PID 1764 wrote to memory of 580 1764 anuf.exe 30 PID 1764 wrote to memory of 580 1764 anuf.exe 30 PID 1764 wrote to memory of 580 1764 anuf.exe 30 PID 1764 wrote to memory of 1672 1764 anuf.exe 31 PID 1764 wrote to memory of 1672 1764 anuf.exe 31 PID 1764 wrote to memory of 1672 1764 anuf.exe 31 PID 1764 wrote to memory of 1672 1764 anuf.exe 31 PID 1764 wrote to memory of 1672 1764 anuf.exe 31 PID 1764 wrote to memory of 516 1764 anuf.exe 32 PID 1764 wrote to memory of 516 1764 anuf.exe 32 PID 1764 wrote to memory of 516 1764 anuf.exe 32 PID 1764 wrote to memory of 516 1764 anuf.exe 32 PID 1764 wrote to memory of 516 1764 anuf.exe 32 PID 1764 wrote to memory of 520 1764 anuf.exe 33 PID 1764 wrote to memory of 520 1764 anuf.exe 33 PID 1764 wrote to memory of 520 1764 anuf.exe 33 PID 1764 wrote to memory of 520 1764 anuf.exe 33 PID 1764 wrote to memory of 520 1764 anuf.exe 33 PID 1764 wrote to memory of 1600 1764 anuf.exe 34 PID 1764 wrote to memory of 1600 1764 anuf.exe 34 PID 1764 wrote to memory of 1600 1764 anuf.exe 34 PID 1764 wrote to memory of 1600 1764 anuf.exe 34 PID 1764 wrote to memory of 1600 1764 anuf.exe 34 PID 1764 wrote to memory of 1800 1764 anuf.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe"C:\Users\Admin\AppData\Local\Temp\263dd453c47b7b4420de3d7b4db6db25f64c1b93a923d58515d9cd38a032e474.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Roaming\Oqyw\anuf.exe"C:\Users\Admin\AppData\Roaming\Oqyw\anuf.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1764
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp27bcbb0f.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1644
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "325504241-850482328-18878463891686842338-8645830181125206691685548572038793338"1⤵PID:580
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1672
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:516
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:520
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1600
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1800
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1144
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:580
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:816
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD50e125da803eb65143afe42aff1d25e68
SHA1f04fd548ff3606238edec981f7b18791cff77318
SHA256ca94f108733468d47dfdcd636809a152ec6ac538219bf9fe7ba66b75a3f21de4
SHA512f112730c3944e1027b273c013306b3e7e788def5f3e69d4745c3ffc493cbdd7a4046e4e8e342cc17be3ec4dc9633fcf307b0efe59240d57d052598d56cb306da
-
Filesize
334KB
MD5f30ceae0f8c2a4e42c991c8f3bd21739
SHA134374f443872b30a291527e6df62731b0821dacf
SHA25688ea055e1fd78451f015dd9fd49952cb393ad0bb5b2e6f150108b8563c22ddb7
SHA5126b5abf216a62ddef155833ae91478b9c6cdf11879aea1435914b03d7aa4674fedc64e129beef51b10985b07083f96d417a0ddca2ccc8691956bb7441754c06fc
-
Filesize
334KB
MD5f30ceae0f8c2a4e42c991c8f3bd21739
SHA134374f443872b30a291527e6df62731b0821dacf
SHA25688ea055e1fd78451f015dd9fd49952cb393ad0bb5b2e6f150108b8563c22ddb7
SHA5126b5abf216a62ddef155833ae91478b9c6cdf11879aea1435914b03d7aa4674fedc64e129beef51b10985b07083f96d417a0ddca2ccc8691956bb7441754c06fc
-
Filesize
421B
MD5ab2b158f164856db2cf9d0532bd8ea19
SHA1fb654dcbbfa9ffbb559ae563b6fca9823bc818d2
SHA25699b9686ed6f74b8de4f15ff45e6d62f051eee8dbdcb2c7cdb7a331241c96c0aa
SHA5122ad7cada02cac28dfcccc87f9608ba10b1fcefa722fdd2e7e4cffd8336191824d74dc42ae8be1bb11facc7c1209da108e95cc90a34cb9ffa530f3bcad368703c
-
Filesize
334KB
MD5f30ceae0f8c2a4e42c991c8f3bd21739
SHA134374f443872b30a291527e6df62731b0821dacf
SHA25688ea055e1fd78451f015dd9fd49952cb393ad0bb5b2e6f150108b8563c22ddb7
SHA5126b5abf216a62ddef155833ae91478b9c6cdf11879aea1435914b03d7aa4674fedc64e129beef51b10985b07083f96d417a0ddca2ccc8691956bb7441754c06fc
-
Filesize
334KB
MD5f30ceae0f8c2a4e42c991c8f3bd21739
SHA134374f443872b30a291527e6df62731b0821dacf
SHA25688ea055e1fd78451f015dd9fd49952cb393ad0bb5b2e6f150108b8563c22ddb7
SHA5126b5abf216a62ddef155833ae91478b9c6cdf11879aea1435914b03d7aa4674fedc64e129beef51b10985b07083f96d417a0ddca2ccc8691956bb7441754c06fc