Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 12:49

General

  • Target

    ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe

  • Size

    200KB

  • MD5

    f9207876312c98414955668105185073

  • SHA1

    761980d1d229e2fefd0cdd4127962760c6a55e7f

  • SHA256

    ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317

  • SHA512

    ee47aad746c923da1bbb645ec226528f00c917113ed2071f601982caa925e65d1d45a669a7ca1bdfc783f3ada083d479e84913ecf8852b45fb258b43c145e3dd

  • SSDEEP

    3072:cqzn6/HBq3qAdGhS4k5p5pU4T4B+jca8Wz/9DMFIW925pOLA/hmqVvTVLC4HTkwn:cqz+Bq3qnop535+Wzmw5pSqpheLwe2

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 17 IoCs
  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies registry class 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe
    "C:\Users\Admin\AppData\Local\Temp\ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Users\Admin\AppData\Local\cyt.exe
      "C:\Users\Admin\AppData\Local\cyt.exe" -gav C:\Users\Admin\AppData\Local\Temp\ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Deletes itself
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:320
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1684
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x590
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1888

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\cyt.exe

    Filesize

    200KB

    MD5

    f84f38e145584046d3a1ef67ee792d56

    SHA1

    4d11fe78ba325da94a08bd35a6bab59c23619b8a

    SHA256

    b11bb3872a0538ad2e51dd2c9f8171876f3fbe1ce5073e951fac89d36855030b

    SHA512

    9fa1a798b26a1acacf8abf87a48f53a600b1c24e4b88c8960afbfd3abf78779da57cf7a7a2eebfeba1e6f9787614770d6645260e9ee467efc0ade785f179c6f5

  • C:\Users\Admin\AppData\Local\cyt.exe

    Filesize

    200KB

    MD5

    f84f38e145584046d3a1ef67ee792d56

    SHA1

    4d11fe78ba325da94a08bd35a6bab59c23619b8a

    SHA256

    b11bb3872a0538ad2e51dd2c9f8171876f3fbe1ce5073e951fac89d36855030b

    SHA512

    9fa1a798b26a1acacf8abf87a48f53a600b1c24e4b88c8960afbfd3abf78779da57cf7a7a2eebfeba1e6f9787614770d6645260e9ee467efc0ade785f179c6f5

  • \Users\Admin\AppData\Local\cyt.exe

    Filesize

    200KB

    MD5

    f84f38e145584046d3a1ef67ee792d56

    SHA1

    4d11fe78ba325da94a08bd35a6bab59c23619b8a

    SHA256

    b11bb3872a0538ad2e51dd2c9f8171876f3fbe1ce5073e951fac89d36855030b

    SHA512

    9fa1a798b26a1acacf8abf87a48f53a600b1c24e4b88c8960afbfd3abf78779da57cf7a7a2eebfeba1e6f9787614770d6645260e9ee467efc0ade785f179c6f5

  • \Users\Admin\AppData\Local\cyt.exe

    Filesize

    200KB

    MD5

    f84f38e145584046d3a1ef67ee792d56

    SHA1

    4d11fe78ba325da94a08bd35a6bab59c23619b8a

    SHA256

    b11bb3872a0538ad2e51dd2c9f8171876f3fbe1ce5073e951fac89d36855030b

    SHA512

    9fa1a798b26a1acacf8abf87a48f53a600b1c24e4b88c8960afbfd3abf78779da57cf7a7a2eebfeba1e6f9787614770d6645260e9ee467efc0ade785f179c6f5

  • memory/320-68-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

    Filesize

    8KB

  • memory/320-69-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/320-70-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/320-71-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/620-58-0x0000000001F90000-0x0000000002247000-memory.dmp

    Filesize

    2.7MB

  • memory/620-57-0x0000000000260000-0x0000000000266000-memory.dmp

    Filesize

    24KB

  • memory/620-56-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/620-63-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/620-55-0x0000000075711000-0x0000000075713000-memory.dmp

    Filesize

    8KB

  • memory/620-54-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/1684-64-0x000007FEFC301000-0x000007FEFC303000-memory.dmp

    Filesize

    8KB