Analysis
-
max time kernel
151s -
max time network
97s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 12:56
Static task
static1
Behavioral task
behavioral1
Sample
ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe
Resource
win10v2004-20220812-en
General
-
Target
ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe
-
Size
260KB
-
MD5
d597f11a6a547a91b4bdbadf478792d6
-
SHA1
8b14288ce560c836429f4254ccc3ce09857d326d
-
SHA256
ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f
-
SHA512
cbe3613fc966e8293e343ed058ba4a1056af38b2607f8a143a18ed4e6c4fae2e0bee8bea46f5ecb2855142742bb3c1a77ff25dd251475368ae411bf203204698
-
SSDEEP
6144:VTqCiHK2Eod+x7tGA70u/sifnAj8EoO1tA3w9:5oqc+tGA7v/siImO17
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1648 ygevi.exe 1692 ygevi.exe -
Deletes itself 1 IoCs
pid Process 268 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1608 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 1608 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\Currentversion\Run ygevi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\Currentversion\Run ygevi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Luebti = "C:\\Users\\Admin\\AppData\\Roaming\\Cewuag\\ygevi.exe" ygevi.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2032 set thread context of 1608 2032 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 27 PID 1648 set thread context of 1692 1648 ygevi.exe 29 -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe 1692 ygevi.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1608 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe Token: SeSecurityPrivilege 1608 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1608 2032 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 27 PID 2032 wrote to memory of 1608 2032 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 27 PID 2032 wrote to memory of 1608 2032 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 27 PID 2032 wrote to memory of 1608 2032 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 27 PID 2032 wrote to memory of 1608 2032 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 27 PID 2032 wrote to memory of 1608 2032 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 27 PID 2032 wrote to memory of 1608 2032 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 27 PID 2032 wrote to memory of 1608 2032 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 27 PID 1608 wrote to memory of 1648 1608 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 28 PID 1608 wrote to memory of 1648 1608 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 28 PID 1608 wrote to memory of 1648 1608 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 28 PID 1608 wrote to memory of 1648 1608 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 28 PID 1648 wrote to memory of 1692 1648 ygevi.exe 29 PID 1648 wrote to memory of 1692 1648 ygevi.exe 29 PID 1648 wrote to memory of 1692 1648 ygevi.exe 29 PID 1648 wrote to memory of 1692 1648 ygevi.exe 29 PID 1648 wrote to memory of 1692 1648 ygevi.exe 29 PID 1648 wrote to memory of 1692 1648 ygevi.exe 29 PID 1648 wrote to memory of 1692 1648 ygevi.exe 29 PID 1648 wrote to memory of 1692 1648 ygevi.exe 29 PID 1608 wrote to memory of 268 1608 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 30 PID 1608 wrote to memory of 268 1608 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 30 PID 1608 wrote to memory of 268 1608 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 30 PID 1608 wrote to memory of 268 1608 ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe 30 PID 1692 wrote to memory of 1136 1692 ygevi.exe 15 PID 1692 wrote to memory of 1136 1692 ygevi.exe 15 PID 1692 wrote to memory of 1136 1692 ygevi.exe 15 PID 1692 wrote to memory of 1136 1692 ygevi.exe 15 PID 1692 wrote to memory of 1136 1692 ygevi.exe 15 PID 1692 wrote to memory of 1232 1692 ygevi.exe 14 PID 1692 wrote to memory of 1232 1692 ygevi.exe 14 PID 1692 wrote to memory of 1232 1692 ygevi.exe 14 PID 1692 wrote to memory of 1232 1692 ygevi.exe 14 PID 1692 wrote to memory of 1232 1692 ygevi.exe 14 PID 1692 wrote to memory of 1268 1692 ygevi.exe 13 PID 1692 wrote to memory of 1268 1692 ygevi.exe 13 PID 1692 wrote to memory of 1268 1692 ygevi.exe 13 PID 1692 wrote to memory of 1268 1692 ygevi.exe 13 PID 1692 wrote to memory of 1268 1692 ygevi.exe 13 PID 1692 wrote to memory of 1388 1692 ygevi.exe 32 PID 1692 wrote to memory of 1388 1692 ygevi.exe 32 PID 1692 wrote to memory of 1388 1692 ygevi.exe 32 PID 1692 wrote to memory of 1388 1692 ygevi.exe 32 PID 1692 wrote to memory of 1388 1692 ygevi.exe 32 PID 1692 wrote to memory of 824 1692 ygevi.exe 33 PID 1692 wrote to memory of 824 1692 ygevi.exe 33 PID 1692 wrote to memory of 824 1692 ygevi.exe 33 PID 1692 wrote to memory of 824 1692 ygevi.exe 33 PID 1692 wrote to memory of 824 1692 ygevi.exe 33 PID 1692 wrote to memory of 1380 1692 ygevi.exe 34 PID 1692 wrote to memory of 1380 1692 ygevi.exe 34 PID 1692 wrote to memory of 1380 1692 ygevi.exe 34 PID 1692 wrote to memory of 1380 1692 ygevi.exe 34 PID 1692 wrote to memory of 1380 1692 ygevi.exe 34 PID 1692 wrote to memory of 1696 1692 ygevi.exe 35 PID 1692 wrote to memory of 1696 1692 ygevi.exe 35 PID 1692 wrote to memory of 1696 1692 ygevi.exe 35 PID 1692 wrote to memory of 1696 1692 ygevi.exe 35 PID 1692 wrote to memory of 1696 1692 ygevi.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe"C:\Users\Admin\AppData\Local\Temp\ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe"C:\Users\Admin\AppData\Local\Temp\ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Roaming\Cewuag\ygevi.exe"C:\Users\Admin\AppData\Roaming\Cewuag\ygevi.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Roaming\Cewuag\ygevi.exe"C:\Users\Admin\AppData\Roaming\Cewuag\ygevi.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8b4c6837.bat"4⤵
- Deletes itself
PID:268
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1232
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1136
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1388
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:824
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1380
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5283ea5143d32c542e5eae4075f8a12b3
SHA182153cf177ea08533c8578e4ac616dffad047de1
SHA2565750c0215dab2ce6694eebfd746ea9e06d630faddedd50df6672957dd0c802c7
SHA51260271f3219748607e757a923faa8194e8ba4af2aa58feba8fded8e3b45c1149a1507f9000cb831932543384986105c1d6113dfdd589238a79a7f57fa69ceb887
-
Filesize
260KB
MD5dc7ae529628cf79d82721277d1008e55
SHA122a8449887e10da6e9872a5ca2f041b74920808b
SHA256edbef1546bf722ddb4cfec3592afa4fdc416cd7380cdc56021c009c3632cbe25
SHA5123a4ddabddecfc7ee1bcb2986ea212ebaf948f406123dbb83bcbf522ece15f23fe2ff9bd29b5595163742a784c3f395499499d49299024e4c3357420e698125be
-
Filesize
260KB
MD5dc7ae529628cf79d82721277d1008e55
SHA122a8449887e10da6e9872a5ca2f041b74920808b
SHA256edbef1546bf722ddb4cfec3592afa4fdc416cd7380cdc56021c009c3632cbe25
SHA5123a4ddabddecfc7ee1bcb2986ea212ebaf948f406123dbb83bcbf522ece15f23fe2ff9bd29b5595163742a784c3f395499499d49299024e4c3357420e698125be
-
Filesize
260KB
MD5dc7ae529628cf79d82721277d1008e55
SHA122a8449887e10da6e9872a5ca2f041b74920808b
SHA256edbef1546bf722ddb4cfec3592afa4fdc416cd7380cdc56021c009c3632cbe25
SHA5123a4ddabddecfc7ee1bcb2986ea212ebaf948f406123dbb83bcbf522ece15f23fe2ff9bd29b5595163742a784c3f395499499d49299024e4c3357420e698125be
-
Filesize
260KB
MD5dc7ae529628cf79d82721277d1008e55
SHA122a8449887e10da6e9872a5ca2f041b74920808b
SHA256edbef1546bf722ddb4cfec3592afa4fdc416cd7380cdc56021c009c3632cbe25
SHA5123a4ddabddecfc7ee1bcb2986ea212ebaf948f406123dbb83bcbf522ece15f23fe2ff9bd29b5595163742a784c3f395499499d49299024e4c3357420e698125be
-
Filesize
260KB
MD5dc7ae529628cf79d82721277d1008e55
SHA122a8449887e10da6e9872a5ca2f041b74920808b
SHA256edbef1546bf722ddb4cfec3592afa4fdc416cd7380cdc56021c009c3632cbe25
SHA5123a4ddabddecfc7ee1bcb2986ea212ebaf948f406123dbb83bcbf522ece15f23fe2ff9bd29b5595163742a784c3f395499499d49299024e4c3357420e698125be