Analysis
-
max time kernel
186s -
max time network
186s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 23:23
Behavioral task
behavioral1
Sample
a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe
Resource
win10v2004-20220812-en
General
-
Target
a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe
-
Size
315KB
-
MD5
fc0c329d5f7d709ac54bcabc29cb68a5
-
SHA1
d6d26ee2e3d43f6b38da33e284ec31810f9d26fa
-
SHA256
a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64
-
SHA512
2890b9b64c6b9bfa45ac65b47528e159dd901598f861615872f4aa9682adbe31dc8b4f0d5a867fb76c70cc1b32fe3432ff953dc1228179cb3d86fab8527dc0ac
-
SSDEEP
6144:Hq3gCcNoqWYHtSdYnI+tnYDcMbY4FmNzNwm+MhUaYxO1BcC1cgi:Hq3Gz1NlnI+1Kb5KzNVNlPcngi
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 1 IoCs
pid Process 584 xyirdy.exe -
Deletes itself 1 IoCs
pid Process 1576 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1188 a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\Currentversion\Run xyirdy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7B2FDFC8-3774-AD4D-C411-AE4FF0968D52} = "C:\\Users\\Admin\\AppData\\Roaming\\Gyxa\\xyirdy.exe" xyirdy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1188 set thread context of 1576 1188 a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe 584 xyirdy.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1188 wrote to memory of 584 1188 a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe 28 PID 1188 wrote to memory of 584 1188 a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe 28 PID 1188 wrote to memory of 584 1188 a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe 28 PID 1188 wrote to memory of 584 1188 a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe 28 PID 584 wrote to memory of 1124 584 xyirdy.exe 18 PID 584 wrote to memory of 1124 584 xyirdy.exe 18 PID 584 wrote to memory of 1124 584 xyirdy.exe 18 PID 584 wrote to memory of 1124 584 xyirdy.exe 18 PID 584 wrote to memory of 1124 584 xyirdy.exe 18 PID 584 wrote to memory of 1208 584 xyirdy.exe 17 PID 584 wrote to memory of 1208 584 xyirdy.exe 17 PID 584 wrote to memory of 1208 584 xyirdy.exe 17 PID 584 wrote to memory of 1208 584 xyirdy.exe 17 PID 584 wrote to memory of 1208 584 xyirdy.exe 17 PID 584 wrote to memory of 1244 584 xyirdy.exe 16 PID 584 wrote to memory of 1244 584 xyirdy.exe 16 PID 584 wrote to memory of 1244 584 xyirdy.exe 16 PID 584 wrote to memory of 1244 584 xyirdy.exe 16 PID 584 wrote to memory of 1244 584 xyirdy.exe 16 PID 584 wrote to memory of 1188 584 xyirdy.exe 13 PID 584 wrote to memory of 1188 584 xyirdy.exe 13 PID 584 wrote to memory of 1188 584 xyirdy.exe 13 PID 584 wrote to memory of 1188 584 xyirdy.exe 13 PID 584 wrote to memory of 1188 584 xyirdy.exe 13 PID 1188 wrote to memory of 1576 1188 a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe 29 PID 1188 wrote to memory of 1576 1188 a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe 29 PID 1188 wrote to memory of 1576 1188 a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe 29 PID 1188 wrote to memory of 1576 1188 a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe 29 PID 1188 wrote to memory of 1576 1188 a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe 29 PID 1188 wrote to memory of 1576 1188 a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe 29 PID 1188 wrote to memory of 1576 1188 a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe 29 PID 1188 wrote to memory of 1576 1188 a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe 29 PID 1188 wrote to memory of 1576 1188 a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe 29 PID 584 wrote to memory of 600 584 xyirdy.exe 30 PID 584 wrote to memory of 600 584 xyirdy.exe 30 PID 584 wrote to memory of 600 584 xyirdy.exe 30 PID 584 wrote to memory of 600 584 xyirdy.exe 30 PID 584 wrote to memory of 600 584 xyirdy.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe"C:\Users\Admin\AppData\Local\Temp\a8301f7da762a3574370e89584970392c1d9242ab40ab43ec092e24f7357df64.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Roaming\Gyxa\xyirdy.exe"C:\Users\Admin\AppData\Roaming\Gyxa\xyirdy.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:584
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpca41ec31.bat"2⤵
- Deletes itself
PID:1576
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1208
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1610666947-6133363717995325851953933309-949269844-1792436431-2088822021-1699625263"1⤵PID:600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
466B
MD54c68c25e2c8bf666dbd5b2d9490333d4
SHA171099b5c9b060ddbb6e4862047ffdf0bc0dcdced
SHA256b193ed3c50bb3ba391cfefe0bc9ab61cb6bb42595f03aee33185894018d4991c
SHA512bec876af82cf52937c6b72f8b5c11104a482ef14b705e65ea427f8dc92e49ca45152ae8d7bd7b98f9135ae8d8d1a6e452a418f4947e22783176e15b4a6b4e745
-
Filesize
307B
MD585de81e089bfe40f15701356943aa67a
SHA14270fcf3e29e83a40f55ce435f0b899998d734cc
SHA256fb3cba941cb2119e3dd7ef65c2b355c21b89af92e42a536789c24332d3f9b37b
SHA51217f433f229c22bf54c4230022481c535c23e67bc4366f652ed072b3f8a57a02352307c818e3a9ee258f636b7c5c438193da8247e99accb5af1f01d0f9e86eb97
-
Filesize
315KB
MD5e41ba673c863cf21849f0bf84e1e0f5e
SHA1e0f18b5fa61014820d2bcb1246b8ceee5f3192e6
SHA2565d96c2cc9c1712fd8f5520b667dd87e3a200bbca97508e6ae039547040d30abe
SHA51221cdde8a97dcdca287c4e8a34ea1be8be757566c616969a2f2017dbe1805c4bdc99168510eb0842eac0825ddc2d3882f91b7322d34607bb9d0401f0b5c5b2f64
-
Filesize
315KB
MD5e41ba673c863cf21849f0bf84e1e0f5e
SHA1e0f18b5fa61014820d2bcb1246b8ceee5f3192e6
SHA2565d96c2cc9c1712fd8f5520b667dd87e3a200bbca97508e6ae039547040d30abe
SHA51221cdde8a97dcdca287c4e8a34ea1be8be757566c616969a2f2017dbe1805c4bdc99168510eb0842eac0825ddc2d3882f91b7322d34607bb9d0401f0b5c5b2f64
-
Filesize
315KB
MD5e41ba673c863cf21849f0bf84e1e0f5e
SHA1e0f18b5fa61014820d2bcb1246b8ceee5f3192e6
SHA2565d96c2cc9c1712fd8f5520b667dd87e3a200bbca97508e6ae039547040d30abe
SHA51221cdde8a97dcdca287c4e8a34ea1be8be757566c616969a2f2017dbe1805c4bdc99168510eb0842eac0825ddc2d3882f91b7322d34607bb9d0401f0b5c5b2f64