Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 12:49
Static task
static1
Behavioral task
behavioral1
Sample
ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe
Resource
win10v2004-20220901-en
General
-
Target
ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe
-
Size
200KB
-
MD5
f9207876312c98414955668105185073
-
SHA1
761980d1d229e2fefd0cdd4127962760c6a55e7f
-
SHA256
ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317
-
SHA512
ee47aad746c923da1bbb645ec226528f00c917113ed2071f601982caa925e65d1d45a669a7ca1bdfc783f3ada083d479e84913ecf8852b45fb258b43c145e3dd
-
SSDEEP
3072:cqzn6/HBq3qAdGhS4k5p5pU4T4B+jca8Wz/9DMFIW925pOLA/hmqVvTVLC4HTkwn:cqz+Bq3qnop535+Wzmw5pSqpheLwe2
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\ = "Application" cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\Content Type = "application/x-msdownload" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\open\command cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\start\command cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\DefaultIcon cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\DefaultIcon\ = "%1" cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\cyt.exe\" -a \"%1\" %*" cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\runas\command cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\start cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\open cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\runas cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" cyt.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 320 cyt.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 320 cyt.exe -
Loads dropped DLL 2 IoCs
pid Process 620 ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe 620 ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" cyt.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\cyt.exe\" -a \"%1\" %*" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\shell\start cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\Content Type = "application/x-msdownload" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\open\command cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\DefaultIcon\ = "%1" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\shell\open cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\shell\open\command cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\runas cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\shell cyt.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\ = "exefile" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\DefaultIcon cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\shell\runas\command cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\ = "Application" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\DefaultIcon cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\open cyt.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\start\command cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\start cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\shell\start\command cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\shell\runas cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\DefaultIcon\ = "%1" cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\cyt.exe\" -a \"%1\" %*" cyt.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\runas\command cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.exe\Content Type = "application/x-msdownload" cyt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" cyt.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 620 ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe 620 ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe 620 ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe 620 ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe 620 ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe 620 ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe 620 ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe 620 ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe 620 ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe 320 cyt.exe 320 cyt.exe 320 cyt.exe 320 cyt.exe 320 cyt.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: 33 1888 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1888 AUDIODG.EXE Token: 33 1888 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1888 AUDIODG.EXE Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 320 cyt.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 320 cyt.exe 1684 explorer.exe 1684 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 320 cyt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 620 wrote to memory of 320 620 ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe 27 PID 620 wrote to memory of 320 620 ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe 27 PID 620 wrote to memory of 320 620 ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe 27 PID 620 wrote to memory of 320 620 ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe"C:\Users\Admin\AppData\Local\Temp\ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\cyt.exe"C:\Users\Admin\AppData\Local\cyt.exe" -gav C:\Users\Admin\AppData\Local\Temp\ce471df96966d75b44262c3a06f364641030fc6c618f2c6c694d366a3c970317.exe2⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:320
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1684
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5901⤵
- Suspicious use of AdjustPrivilegeToken
PID:1888
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5f84f38e145584046d3a1ef67ee792d56
SHA14d11fe78ba325da94a08bd35a6bab59c23619b8a
SHA256b11bb3872a0538ad2e51dd2c9f8171876f3fbe1ce5073e951fac89d36855030b
SHA5129fa1a798b26a1acacf8abf87a48f53a600b1c24e4b88c8960afbfd3abf78779da57cf7a7a2eebfeba1e6f9787614770d6645260e9ee467efc0ade785f179c6f5
-
Filesize
200KB
MD5f84f38e145584046d3a1ef67ee792d56
SHA14d11fe78ba325da94a08bd35a6bab59c23619b8a
SHA256b11bb3872a0538ad2e51dd2c9f8171876f3fbe1ce5073e951fac89d36855030b
SHA5129fa1a798b26a1acacf8abf87a48f53a600b1c24e4b88c8960afbfd3abf78779da57cf7a7a2eebfeba1e6f9787614770d6645260e9ee467efc0ade785f179c6f5
-
Filesize
200KB
MD5f84f38e145584046d3a1ef67ee792d56
SHA14d11fe78ba325da94a08bd35a6bab59c23619b8a
SHA256b11bb3872a0538ad2e51dd2c9f8171876f3fbe1ce5073e951fac89d36855030b
SHA5129fa1a798b26a1acacf8abf87a48f53a600b1c24e4b88c8960afbfd3abf78779da57cf7a7a2eebfeba1e6f9787614770d6645260e9ee467efc0ade785f179c6f5
-
Filesize
200KB
MD5f84f38e145584046d3a1ef67ee792d56
SHA14d11fe78ba325da94a08bd35a6bab59c23619b8a
SHA256b11bb3872a0538ad2e51dd2c9f8171876f3fbe1ce5073e951fac89d36855030b
SHA5129fa1a798b26a1acacf8abf87a48f53a600b1c24e4b88c8960afbfd3abf78779da57cf7a7a2eebfeba1e6f9787614770d6645260e9ee467efc0ade785f179c6f5