Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe
Resource
win10v2004-20220901-en
General
-
Target
b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe
-
Size
226KB
-
MD5
79f875dc26c65118f42685d840f3b3d2
-
SHA1
4fe505c46fab53e06694c69f3fd96c638f763d6a
-
SHA256
b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921
-
SHA512
708704308f0c479e8d43ae4a4b792a6788b7253ad4aa9b482698a9f760ce53e312390c55f617ef77558bf5bf307b1fdb580324e0660f23f82da1ee2f540d8a80
-
SSDEEP
6144:y1UDbH3ddnSueE5DsqGYIKeOUJOAOO8IucPK4jr:DDbHtIVE5QLYIKBUJO5XZgK4n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1144 delu.exe -
Deletes itself 1 IoCs
pid Process 812 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run delu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Pocounomn = "C:\\Users\\Admin\\AppData\\Roaming\\Piocte\\delu.exe" delu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1760 set thread context of 812 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe 29 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\5520083D-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe 1144 delu.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeSecurityPrivilege 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe Token: SeSecurityPrivilege 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe Token: SeSecurityPrivilege 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe Token: SeSecurityPrivilege 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe Token: SeSecurityPrivilege 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe Token: SeSecurityPrivilege 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe Token: SeSecurityPrivilege 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe Token: SeSecurityPrivilege 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe Token: SeSecurityPrivilege 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe Token: SeSecurityPrivilege 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe Token: SeManageVolumePrivilege 1796 WinMail.exe Token: SeSecurityPrivilege 812 cmd.exe Token: SeSecurityPrivilege 812 cmd.exe Token: SeSecurityPrivilege 812 cmd.exe Token: SeSecurityPrivilege 812 cmd.exe Token: SeSecurityPrivilege 812 cmd.exe Token: SeSecurityPrivilege 812 cmd.exe Token: SeSecurityPrivilege 812 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1796 WinMail.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe 1144 delu.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1144 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe 27 PID 1760 wrote to memory of 1144 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe 27 PID 1760 wrote to memory of 1144 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe 27 PID 1760 wrote to memory of 1144 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe 27 PID 1144 wrote to memory of 1112 1144 delu.exe 17 PID 1144 wrote to memory of 1112 1144 delu.exe 17 PID 1144 wrote to memory of 1112 1144 delu.exe 17 PID 1144 wrote to memory of 1112 1144 delu.exe 17 PID 1144 wrote to memory of 1112 1144 delu.exe 17 PID 1144 wrote to memory of 1176 1144 delu.exe 16 PID 1144 wrote to memory of 1176 1144 delu.exe 16 PID 1144 wrote to memory of 1176 1144 delu.exe 16 PID 1144 wrote to memory of 1176 1144 delu.exe 16 PID 1144 wrote to memory of 1176 1144 delu.exe 16 PID 1144 wrote to memory of 1204 1144 delu.exe 15 PID 1144 wrote to memory of 1204 1144 delu.exe 15 PID 1144 wrote to memory of 1204 1144 delu.exe 15 PID 1144 wrote to memory of 1204 1144 delu.exe 15 PID 1144 wrote to memory of 1204 1144 delu.exe 15 PID 1144 wrote to memory of 1760 1144 delu.exe 26 PID 1144 wrote to memory of 1760 1144 delu.exe 26 PID 1144 wrote to memory of 1760 1144 delu.exe 26 PID 1144 wrote to memory of 1760 1144 delu.exe 26 PID 1144 wrote to memory of 1760 1144 delu.exe 26 PID 1144 wrote to memory of 1796 1144 delu.exe 28 PID 1144 wrote to memory of 1796 1144 delu.exe 28 PID 1144 wrote to memory of 1796 1144 delu.exe 28 PID 1144 wrote to memory of 1796 1144 delu.exe 28 PID 1144 wrote to memory of 1796 1144 delu.exe 28 PID 1760 wrote to memory of 812 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe 29 PID 1760 wrote to memory of 812 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe 29 PID 1760 wrote to memory of 812 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe 29 PID 1760 wrote to memory of 812 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe 29 PID 1760 wrote to memory of 812 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe 29 PID 1760 wrote to memory of 812 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe 29 PID 1760 wrote to memory of 812 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe 29 PID 1760 wrote to memory of 812 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe 29 PID 1760 wrote to memory of 812 1760 b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe 29 PID 1144 wrote to memory of 1704 1144 delu.exe 30 PID 1144 wrote to memory of 1704 1144 delu.exe 30 PID 1144 wrote to memory of 1704 1144 delu.exe 30 PID 1144 wrote to memory of 1704 1144 delu.exe 30 PID 1144 wrote to memory of 1704 1144 delu.exe 30 PID 1144 wrote to memory of 1576 1144 delu.exe 32 PID 1144 wrote to memory of 1576 1144 delu.exe 32 PID 1144 wrote to memory of 1576 1144 delu.exe 32 PID 1144 wrote to memory of 1576 1144 delu.exe 32 PID 1144 wrote to memory of 1576 1144 delu.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe"C:\Users\Admin\AppData\Local\Temp\b4ec602eceb647459a5948bffc253e5a01594d2bc8f5ed916a470c6afc070921.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Roaming\Piocte\delu.exe"C:\Users\Admin\AppData\Roaming\Piocte\delu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1144
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp3d51a36a.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1796
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1704
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD59b7fee01db32b5279f33b79558de56dd
SHA147d5360e4c44f758b9945bf890e4b618a9e75d0b
SHA256b76dd1e6c0ba75118bb3da834cc8f1ad77898b2e8e551580f20b85a9da7f2b30
SHA512b5b422f69d1c129ab7b3ae5b5f8de8939f43f0430d405f4554059597569a22f006dab62ad517437e3795e37e9928c43e8ad6f91d020cca1d0d655edc20ee6052
-
Filesize
226KB
MD5abce4d3befeb0ccea2ad4c328a22f57f
SHA118bb24bde157528f6510c759ba99339a2cf4d29f
SHA256a4734eb42db36d50b7d7b10b857ac52a1211216a35f9782df9ee7a558e19b0c0
SHA51235de97f5cd4792402c95f902886c988d5128e886f1f623808d8d6c777ea184244320821506cdf013d1ac77d5f367851a47631aed55a42ae487c7f336caf3dfb9
-
Filesize
226KB
MD5abce4d3befeb0ccea2ad4c328a22f57f
SHA118bb24bde157528f6510c759ba99339a2cf4d29f
SHA256a4734eb42db36d50b7d7b10b857ac52a1211216a35f9782df9ee7a558e19b0c0
SHA51235de97f5cd4792402c95f902886c988d5128e886f1f623808d8d6c777ea184244320821506cdf013d1ac77d5f367851a47631aed55a42ae487c7f336caf3dfb9
-
Filesize
4KB
MD55fcd841951d052ad8a35d4f0d34a2b65
SHA1cfb141d82e53e0bb65de992b654ef2d1689f350c
SHA25626109a39625f1e92946bfbd900136d8d67f02ddb3d1dfc14f78cfd7a3deb8099
SHA5121eeb2c30e81c6ab8a6d41449044b2711875df38840173c96542e80c7c8b5f6138d62ccba8da82b4e0f74baee7a99d1ae25816a09f0bb4a62c40fee2959bf5ed2
-
Filesize
226KB
MD5abce4d3befeb0ccea2ad4c328a22f57f
SHA118bb24bde157528f6510c759ba99339a2cf4d29f
SHA256a4734eb42db36d50b7d7b10b857ac52a1211216a35f9782df9ee7a558e19b0c0
SHA51235de97f5cd4792402c95f902886c988d5128e886f1f623808d8d6c777ea184244320821506cdf013d1ac77d5f367851a47631aed55a42ae487c7f336caf3dfb9