Analysis
-
max time kernel
153s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe
Resource
win10v2004-20221111-en
General
-
Target
77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe
-
Size
296KB
-
MD5
fcf6059f1fe539b6f01a396e8d0f7935
-
SHA1
574217abe2b6ec30ad612cb2c742ca0be2ec90d9
-
SHA256
77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b
-
SHA512
6739f5ce3ae0aba1352b9e74cacc169f2f75d4f0062cd4efe1503de01b08925870686f36d5f81bf0dbc475fc2da7879b201a857e862e883155b0508eacb3fb15
-
SSDEEP
6144:qJseH4vk7EO2gHFRQbz7sr3uz6Wfvx59YZiTTNNHel0vzVcna0:neH4MEO2+FqPaNWHx59DTxNXmF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1452 xydav.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run xydav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Xydav = "C:\\Users\\Admin\\AppData\\Roaming\\Magap\\xydav.exe" xydav.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 676 set thread context of 3240 676 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 88 -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe 1452 xydav.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 676 wrote to memory of 1452 676 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 82 PID 676 wrote to memory of 1452 676 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 82 PID 676 wrote to memory of 1452 676 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 82 PID 1452 wrote to memory of 2752 1452 xydav.exe 42 PID 1452 wrote to memory of 2752 1452 xydav.exe 42 PID 1452 wrote to memory of 2752 1452 xydav.exe 42 PID 1452 wrote to memory of 2752 1452 xydav.exe 42 PID 1452 wrote to memory of 2752 1452 xydav.exe 42 PID 1452 wrote to memory of 2792 1452 xydav.exe 41 PID 1452 wrote to memory of 2792 1452 xydav.exe 41 PID 1452 wrote to memory of 2792 1452 xydav.exe 41 PID 1452 wrote to memory of 2792 1452 xydav.exe 41 PID 1452 wrote to memory of 2792 1452 xydav.exe 41 PID 1452 wrote to memory of 2844 1452 xydav.exe 40 PID 1452 wrote to memory of 2844 1452 xydav.exe 40 PID 1452 wrote to memory of 2844 1452 xydav.exe 40 PID 1452 wrote to memory of 2844 1452 xydav.exe 40 PID 1452 wrote to memory of 2844 1452 xydav.exe 40 PID 1452 wrote to memory of 2600 1452 xydav.exe 38 PID 1452 wrote to memory of 2600 1452 xydav.exe 38 PID 1452 wrote to memory of 2600 1452 xydav.exe 38 PID 1452 wrote to memory of 2600 1452 xydav.exe 38 PID 1452 wrote to memory of 2600 1452 xydav.exe 38 PID 1452 wrote to memory of 3080 1452 xydav.exe 37 PID 1452 wrote to memory of 3080 1452 xydav.exe 37 PID 1452 wrote to memory of 3080 1452 xydav.exe 37 PID 1452 wrote to memory of 3080 1452 xydav.exe 37 PID 1452 wrote to memory of 3080 1452 xydav.exe 37 PID 1452 wrote to memory of 3284 1452 xydav.exe 36 PID 1452 wrote to memory of 3284 1452 xydav.exe 36 PID 1452 wrote to memory of 3284 1452 xydav.exe 36 PID 1452 wrote to memory of 3284 1452 xydav.exe 36 PID 1452 wrote to memory of 3284 1452 xydav.exe 36 PID 1452 wrote to memory of 3372 1452 xydav.exe 35 PID 1452 wrote to memory of 3372 1452 xydav.exe 35 PID 1452 wrote to memory of 3372 1452 xydav.exe 35 PID 1452 wrote to memory of 3372 1452 xydav.exe 35 PID 1452 wrote to memory of 3372 1452 xydav.exe 35 PID 1452 wrote to memory of 3440 1452 xydav.exe 12 PID 1452 wrote to memory of 3440 1452 xydav.exe 12 PID 1452 wrote to memory of 3440 1452 xydav.exe 12 PID 1452 wrote to memory of 3440 1452 xydav.exe 12 PID 1452 wrote to memory of 3440 1452 xydav.exe 12 PID 1452 wrote to memory of 3528 1452 xydav.exe 34 PID 1452 wrote to memory of 3528 1452 xydav.exe 34 PID 1452 wrote to memory of 3528 1452 xydav.exe 34 PID 1452 wrote to memory of 3528 1452 xydav.exe 34 PID 1452 wrote to memory of 3528 1452 xydav.exe 34 PID 1452 wrote to memory of 3720 1452 xydav.exe 33 PID 1452 wrote to memory of 3720 1452 xydav.exe 33 PID 1452 wrote to memory of 3720 1452 xydav.exe 33 PID 1452 wrote to memory of 3720 1452 xydav.exe 33 PID 1452 wrote to memory of 3720 1452 xydav.exe 33 PID 1452 wrote to memory of 4396 1452 xydav.exe 16 PID 1452 wrote to memory of 4396 1452 xydav.exe 16 PID 1452 wrote to memory of 4396 1452 xydav.exe 16 PID 1452 wrote to memory of 4396 1452 xydav.exe 16 PID 1452 wrote to memory of 4396 1452 xydav.exe 16 PID 1452 wrote to memory of 4932 1452 xydav.exe 15 PID 1452 wrote to memory of 4932 1452 xydav.exe 15 PID 1452 wrote to memory of 4932 1452 xydav.exe 15 PID 1452 wrote to memory of 4048 1452 xydav.exe 13 PID 1452 wrote to memory of 4048 1452 xydav.exe 13 PID 1452 wrote to memory of 4048 1452 xydav.exe 13
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3440
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4048
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4932
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4396
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3720
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3528
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3372
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3080
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe"C:\Users\Admin\AppData\Local\Temp\77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Roaming\Magap\xydav.exe"C:\Users\Admin\AppData\Roaming\Magap\xydav.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1452
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\WZLB7B5.bat"3⤵PID:3240
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2792
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2752
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:5064
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:1056
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:3452
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3300
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD5770e6d93b47c3b0c70186221a132c7c3
SHA133990cd4f96491a230f51db06b0b08290f437547
SHA256ecd078fb5940a12bb60e4a62d2daed4b37efacec6a394d88e4211a3c26aafad0
SHA512671b5658dae1ca54d0cfb880cf1be01b2296426c9faf000cd0394145ca05c1eb7300bcd17a8a51be68b04225dd8d346a8cbbaf9bd03f90ed85036a7be2933a74
-
Filesize
296KB
MD5bbd39b2ac50ec061b96460d1d2a6efd1
SHA14ad5691034fb3fd890a9f8e81a807d7aa8092d1f
SHA25623360389f6320e98889d0c6189554fca1523af36bf051581f3ff0ea51cf43a84
SHA51242a4701d0554b37f7cf167ccb997f2b84111afbc0c7ea26a424b5d2aab38fd3045b2130f88f1d2bd8177290640fcdd3216997429341ab7470e5686dce57578ad
-
Filesize
296KB
MD5bbd39b2ac50ec061b96460d1d2a6efd1
SHA14ad5691034fb3fd890a9f8e81a807d7aa8092d1f
SHA25623360389f6320e98889d0c6189554fca1523af36bf051581f3ff0ea51cf43a84
SHA51242a4701d0554b37f7cf167ccb997f2b84111afbc0c7ea26a424b5d2aab38fd3045b2130f88f1d2bd8177290640fcdd3216997429341ab7470e5686dce57578ad