Analysis
-
max time kernel
151s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe
Resource
win10v2004-20221111-en
General
-
Target
fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe
-
Size
355KB
-
MD5
275cd8b02cdeb8141c0b163f688d0ac7
-
SHA1
9e5dd32d0ffd156e52626f2434a13f91dcfe0c8a
-
SHA256
fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f
-
SHA512
ffe20aadc74631806c7675f3de8452a82b953b5bd6034f0fe86108e6d2dc837a283212ddc7dab70531f4c193c5bf0040e7d21217bbb4f1c47299f76c17793cc9
-
SSDEEP
6144:lX10fTKi+W9tXyCHPtOB1g0cL2Cn8gczuwpUaFhQLvg:110bKE9tTHPgML2C8gDCUmL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1124 buytu.exe -
Deletes itself 1 IoCs
pid Process 1604 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run buytu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7BD94DA8-4FEF-AD4D-5225-887A4931AB67} = "C:\\Users\\Admin\\AppData\\Roaming\\Dywatu\\buytu.exe" buytu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 976 set thread context of 1604 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe 1124 buytu.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 1124 buytu.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 976 wrote to memory of 1124 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 27 PID 976 wrote to memory of 1124 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 27 PID 976 wrote to memory of 1124 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 27 PID 976 wrote to memory of 1124 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 27 PID 1124 wrote to memory of 1240 1124 buytu.exe 18 PID 1124 wrote to memory of 1240 1124 buytu.exe 18 PID 1124 wrote to memory of 1240 1124 buytu.exe 18 PID 1124 wrote to memory of 1240 1124 buytu.exe 18 PID 1124 wrote to memory of 1240 1124 buytu.exe 18 PID 1124 wrote to memory of 1336 1124 buytu.exe 17 PID 1124 wrote to memory of 1336 1124 buytu.exe 17 PID 1124 wrote to memory of 1336 1124 buytu.exe 17 PID 1124 wrote to memory of 1336 1124 buytu.exe 17 PID 1124 wrote to memory of 1336 1124 buytu.exe 17 PID 1124 wrote to memory of 1392 1124 buytu.exe 15 PID 1124 wrote to memory of 1392 1124 buytu.exe 15 PID 1124 wrote to memory of 1392 1124 buytu.exe 15 PID 1124 wrote to memory of 1392 1124 buytu.exe 15 PID 1124 wrote to memory of 1392 1124 buytu.exe 15 PID 1124 wrote to memory of 976 1124 buytu.exe 16 PID 1124 wrote to memory of 976 1124 buytu.exe 16 PID 1124 wrote to memory of 976 1124 buytu.exe 16 PID 1124 wrote to memory of 976 1124 buytu.exe 16 PID 1124 wrote to memory of 976 1124 buytu.exe 16 PID 976 wrote to memory of 1604 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 28 PID 976 wrote to memory of 1604 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 28 PID 976 wrote to memory of 1604 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 28 PID 976 wrote to memory of 1604 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 28 PID 976 wrote to memory of 1604 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 28 PID 976 wrote to memory of 1604 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 28 PID 976 wrote to memory of 1604 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 28 PID 976 wrote to memory of 1604 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 28 PID 976 wrote to memory of 1604 976 fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe"C:\Users\Admin\AppData\Local\Temp\fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Roaming\Dywatu\buytu.exe"C:\Users\Admin\AppData\Roaming\Dywatu\buytu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1124
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp2e86c866.bat"3⤵
- Deletes itself
PID:1604
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1336
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD592145999788bc4e17736d9527e39ea9e
SHA1cb88548099475f12238992886612c8fd01bb7362
SHA2563eed3b39dbca6abbd361c047d7d193e65fc8c4fc4a4f9d4b6d1d002ef6d15163
SHA512ea628fe1eac51a9c8a6427c3b01da6a062e37660c6b4a042cecc4dea352c0590254f7b9425dd5db3b8f19149ebf47ee001fc431e559a451d0512ab7eb1559583
-
Filesize
355KB
MD5a2e6d075fc2b24906b353d45abe8d735
SHA11f620f9080ce89871b4b34b443059592fdb14029
SHA25602243945592fcf8c75103eb5438f1b32f6c07a8979cc92bbcd4d97cfc03c06cf
SHA512b6b3230db5320b5e25c74ed48077d39bb9444fd6c57805f200c08515255e9e81e10928fe57c2b5bb0917809dc3abeb23f33323b5060700a782f027e05bad72c3
-
Filesize
355KB
MD5a2e6d075fc2b24906b353d45abe8d735
SHA11f620f9080ce89871b4b34b443059592fdb14029
SHA25602243945592fcf8c75103eb5438f1b32f6c07a8979cc92bbcd4d97cfc03c06cf
SHA512b6b3230db5320b5e25c74ed48077d39bb9444fd6c57805f200c08515255e9e81e10928fe57c2b5bb0917809dc3abeb23f33323b5060700a782f027e05bad72c3
-
Filesize
355KB
MD5a2e6d075fc2b24906b353d45abe8d735
SHA11f620f9080ce89871b4b34b443059592fdb14029
SHA25602243945592fcf8c75103eb5438f1b32f6c07a8979cc92bbcd4d97cfc03c06cf
SHA512b6b3230db5320b5e25c74ed48077d39bb9444fd6c57805f200c08515255e9e81e10928fe57c2b5bb0917809dc3abeb23f33323b5060700a782f027e05bad72c3
-
Filesize
355KB
MD5a2e6d075fc2b24906b353d45abe8d735
SHA11f620f9080ce89871b4b34b443059592fdb14029
SHA25602243945592fcf8c75103eb5438f1b32f6c07a8979cc92bbcd4d97cfc03c06cf
SHA512b6b3230db5320b5e25c74ed48077d39bb9444fd6c57805f200c08515255e9e81e10928fe57c2b5bb0917809dc3abeb23f33323b5060700a782f027e05bad72c3