Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 23:27
Behavioral task
behavioral1
Sample
cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe
Resource
win10v2004-20220812-en
General
-
Target
cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe
-
Size
206KB
-
MD5
a35d45cc93bd866f9a06c75939023cf7
-
SHA1
d823d0a4bee7d38318ba03842962e25624e8b39f
-
SHA256
cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d
-
SHA512
e10e9ea55ac3d3e853380141df1baf541b1ceb07e7acf96f452c42b3fc6e2553c0dd7b08b09599ee19539e014faac16b5e5af15b1ef8fff78683ac079ec336bf
-
SSDEEP
6144:XEtB2/V0RC1/u2SGuW4o+SJuf/a1zjdHUkNDa3tK:XU8/Vx/u2Ju7lUzjpUEDWt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1776 roeqt.exe -
resource yara_rule behavioral1/files/0x000a0000000122f9-58.dat upx behavioral1/files/0x000a0000000122f9-59.dat upx behavioral1/files/0x000a0000000122f9-61.dat upx behavioral1/memory/1776-64-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/files/0x000a0000000122f9-66.dat upx -
Deletes itself 1 IoCs
pid Process 1996 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run roeqt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\{875BD3E4-FED9-42CB-AF9C-C688BF4A42B2} = "C:\\Users\\Admin\\AppData\\Roaming\\Yvap\\roeqt.exe" roeqt.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum roeqt.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 roeqt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1292 set thread context of 1996 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\6D2E7BA2-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe 1776 roeqt.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeSecurityPrivilege 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe Token: SeSecurityPrivilege 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe Token: SeSecurityPrivilege 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe Token: SeManageVolumePrivilege 568 WinMail.exe Token: SeSecurityPrivilege 1996 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 568 WinMail.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1776 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe 27 PID 1292 wrote to memory of 1776 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe 27 PID 1292 wrote to memory of 1776 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe 27 PID 1292 wrote to memory of 1776 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe 27 PID 1776 wrote to memory of 1112 1776 roeqt.exe 12 PID 1776 wrote to memory of 1112 1776 roeqt.exe 12 PID 1776 wrote to memory of 1112 1776 roeqt.exe 12 PID 1776 wrote to memory of 1112 1776 roeqt.exe 12 PID 1776 wrote to memory of 1112 1776 roeqt.exe 12 PID 1776 wrote to memory of 1176 1776 roeqt.exe 19 PID 1776 wrote to memory of 1176 1776 roeqt.exe 19 PID 1776 wrote to memory of 1176 1776 roeqt.exe 19 PID 1776 wrote to memory of 1176 1776 roeqt.exe 19 PID 1776 wrote to memory of 1176 1776 roeqt.exe 19 PID 1776 wrote to memory of 1200 1776 roeqt.exe 18 PID 1776 wrote to memory of 1200 1776 roeqt.exe 18 PID 1776 wrote to memory of 1200 1776 roeqt.exe 18 PID 1776 wrote to memory of 1200 1776 roeqt.exe 18 PID 1776 wrote to memory of 1200 1776 roeqt.exe 18 PID 1776 wrote to memory of 1292 1776 roeqt.exe 26 PID 1776 wrote to memory of 1292 1776 roeqt.exe 26 PID 1776 wrote to memory of 1292 1776 roeqt.exe 26 PID 1776 wrote to memory of 1292 1776 roeqt.exe 26 PID 1776 wrote to memory of 1292 1776 roeqt.exe 26 PID 1776 wrote to memory of 568 1776 roeqt.exe 28 PID 1776 wrote to memory of 568 1776 roeqt.exe 28 PID 1776 wrote to memory of 568 1776 roeqt.exe 28 PID 1776 wrote to memory of 568 1776 roeqt.exe 28 PID 1776 wrote to memory of 568 1776 roeqt.exe 28 PID 1292 wrote to memory of 1996 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe 29 PID 1292 wrote to memory of 1996 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe 29 PID 1292 wrote to memory of 1996 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe 29 PID 1292 wrote to memory of 1996 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe 29 PID 1292 wrote to memory of 1996 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe 29 PID 1292 wrote to memory of 1996 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe 29 PID 1292 wrote to memory of 1996 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe 29 PID 1292 wrote to memory of 1996 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe 29 PID 1292 wrote to memory of 1996 1292 cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe 29 PID 1776 wrote to memory of 856 1776 roeqt.exe 30 PID 1776 wrote to memory of 856 1776 roeqt.exe 30 PID 1776 wrote to memory of 856 1776 roeqt.exe 30 PID 1776 wrote to memory of 856 1776 roeqt.exe 30 PID 1776 wrote to memory of 856 1776 roeqt.exe 30 PID 1776 wrote to memory of 1080 1776 roeqt.exe 31 PID 1776 wrote to memory of 1080 1776 roeqt.exe 31 PID 1776 wrote to memory of 1080 1776 roeqt.exe 31 PID 1776 wrote to memory of 1080 1776 roeqt.exe 31 PID 1776 wrote to memory of 1080 1776 roeqt.exe 31 PID 1776 wrote to memory of 920 1776 roeqt.exe 32 PID 1776 wrote to memory of 920 1776 roeqt.exe 32 PID 1776 wrote to memory of 920 1776 roeqt.exe 32 PID 1776 wrote to memory of 920 1776 roeqt.exe 32 PID 1776 wrote to memory of 920 1776 roeqt.exe 32 PID 1776 wrote to memory of 1692 1776 roeqt.exe 33 PID 1776 wrote to memory of 1692 1776 roeqt.exe 33 PID 1776 wrote to memory of 1692 1776 roeqt.exe 33 PID 1776 wrote to memory of 1692 1776 roeqt.exe 33 PID 1776 wrote to memory of 1692 1776 roeqt.exe 33
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe"C:\Users\Admin\AppData\Local\Temp\cc4810e3f3278b3b60e99dad5bedb7597e9a70d707b3dbba6e82c49a2e1ef72d.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Roaming\Yvap\roeqt.exe"C:\Users\Admin\AppData\Roaming\Yvap\roeqt.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8de5fbdd.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:568
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "208425040-11842592401660462489-17441910581877473769765504759-1018265139129739885"1⤵PID:856
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1080
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:920
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5ca56b66e79505f27dedbf36e8cc5d209
SHA143fb34fd9290affd245ddbb1aa5e62c56242e419
SHA256a9659b22699e77dfc502a05ad619521d42f16d5207d7771be8e9745daff3385a
SHA512e73e0b7ad838954c707b716aaf808c83074e3c97cf24b2503ca3512dd4a25ea442f4e3e81c48b069b4206d6b4825ffab91693bf10c76324f623eecb38d4fb0d8
-
Filesize
398B
MD5f17427f8e178059aa6be3d10d7d40227
SHA169b0466bbafef59c5334b1a0895ceb901d7427e5
SHA2561b1979ad110179e29914c492d4d490ebd18f0028cddb82836a110ee3e19e1865
SHA5124ed0e1eb07f21113c51c7d855e3f63f422bc63b65d63f6efc6fac7656ad616e10a9ee77b0131937750429dbed76b97693b2b819d96a98f4bcadc506872d34790
-
Filesize
206KB
MD5532d9a9ce55ec2082a433365ba8c8178
SHA1e841845be9e6da51631f0858226627ab783ddbea
SHA256ad49564d3844613092e271591d984481dee6258cfffbfa78f7da016a59d17406
SHA512ad3a64c01b931509fd8d6b9d69f01684ee32930473c37ceda6091caa79ab9f51d2ed13df66cdf790cecd7982a3fb12f518eab46492123c893426b4d8ac313e28
-
Filesize
206KB
MD5532d9a9ce55ec2082a433365ba8c8178
SHA1e841845be9e6da51631f0858226627ab783ddbea
SHA256ad49564d3844613092e271591d984481dee6258cfffbfa78f7da016a59d17406
SHA512ad3a64c01b931509fd8d6b9d69f01684ee32930473c37ceda6091caa79ab9f51d2ed13df66cdf790cecd7982a3fb12f518eab46492123c893426b4d8ac313e28
-
Filesize
206KB
MD5532d9a9ce55ec2082a433365ba8c8178
SHA1e841845be9e6da51631f0858226627ab783ddbea
SHA256ad49564d3844613092e271591d984481dee6258cfffbfa78f7da016a59d17406
SHA512ad3a64c01b931509fd8d6b9d69f01684ee32930473c37ceda6091caa79ab9f51d2ed13df66cdf790cecd7982a3fb12f518eab46492123c893426b4d8ac313e28
-
Filesize
206KB
MD5532d9a9ce55ec2082a433365ba8c8178
SHA1e841845be9e6da51631f0858226627ab783ddbea
SHA256ad49564d3844613092e271591d984481dee6258cfffbfa78f7da016a59d17406
SHA512ad3a64c01b931509fd8d6b9d69f01684ee32930473c37ceda6091caa79ab9f51d2ed13df66cdf790cecd7982a3fb12f518eab46492123c893426b4d8ac313e28