Analysis
-
max time kernel
252s -
max time network
366s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 05:42
Static task
static1
Behavioral task
behavioral1
Sample
aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe
Resource
win10v2004-20221111-en
General
-
Target
aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe
-
Size
345KB
-
MD5
3573ae2f0fc7906647c4d5ae40ccf5ce
-
SHA1
3e96da3eac35005ad11a7790be33077820f4fb5b
-
SHA256
aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4
-
SHA512
d5e88622ab7f72b46fb4af82947c34a901975b74caa9e28913a980424fe70b2d863ed39d3e78bc9ef9267e7f637f22f331341d405587ae1eeeaeef42c3ab9d1f
-
SSDEEP
6144:joKC4aGm1USwU9sllfoMKeUcrkqk2EmYqlVskmeHUt+J53VV/z55m+m8w:AHbwHLf9KedkoEmlzJUeFWCw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 396 boadeguxuv.exe 1608 boadeguxuv.exe -
Deletes itself 1 IoCs
pid Process 1084 cmd.exe -
Loads dropped DLL 6 IoCs
pid Process 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 1608 boadeguxuv.exe 1608 boadeguxuv.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\SOFTWARE\Microsoft\Windows\Currentversion\Run boadeguxuv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\Currentversion\Run boadeguxuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Riylyk = "C:\\Users\\Admin\\AppData\\Roaming\\Asruykhyqe\\boadeguxuv.exe" boadeguxuv.exe -
Drops autorun.inf file 1 TTPs 8 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\Autorun.inf aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe File opened for modification C:\Autorun.inf aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe File created D:\Autorun.inf aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe File opened for modification D:\Autorun.inf aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe File created C:\Autorun.inf boadeguxuv.exe File opened for modification C:\Autorun.inf boadeguxuv.exe File created D:\Autorun.inf boadeguxuv.exe File opened for modification D:\Autorun.inf boadeguxuv.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1740 set thread context of 296 1740 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 28 PID 396 set thread context of 1608 396 boadeguxuv.exe 30 -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 1608 boadeguxuv.exe 1608 boadeguxuv.exe 1608 boadeguxuv.exe 1608 boadeguxuv.exe 1608 boadeguxuv.exe 1608 boadeguxuv.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeSecurityPrivilege 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe Token: SeSecurityPrivilege 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe Token: SeSecurityPrivilege 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe Token: SeSecurityPrivilege 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe Token: SeSecurityPrivilege 1608 boadeguxuv.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1740 wrote to memory of 296 1740 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 28 PID 1740 wrote to memory of 296 1740 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 28 PID 1740 wrote to memory of 296 1740 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 28 PID 1740 wrote to memory of 296 1740 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 28 PID 1740 wrote to memory of 296 1740 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 28 PID 1740 wrote to memory of 296 1740 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 28 PID 1740 wrote to memory of 296 1740 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 28 PID 1740 wrote to memory of 296 1740 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 28 PID 1740 wrote to memory of 296 1740 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 28 PID 296 wrote to memory of 396 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 29 PID 296 wrote to memory of 396 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 29 PID 296 wrote to memory of 396 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 29 PID 296 wrote to memory of 396 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 29 PID 396 wrote to memory of 1608 396 boadeguxuv.exe 30 PID 396 wrote to memory of 1608 396 boadeguxuv.exe 30 PID 396 wrote to memory of 1608 396 boadeguxuv.exe 30 PID 396 wrote to memory of 1608 396 boadeguxuv.exe 30 PID 396 wrote to memory of 1608 396 boadeguxuv.exe 30 PID 396 wrote to memory of 1608 396 boadeguxuv.exe 30 PID 396 wrote to memory of 1608 396 boadeguxuv.exe 30 PID 396 wrote to memory of 1608 396 boadeguxuv.exe 30 PID 396 wrote to memory of 1608 396 boadeguxuv.exe 30 PID 296 wrote to memory of 1084 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 31 PID 296 wrote to memory of 1084 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 31 PID 296 wrote to memory of 1084 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 31 PID 296 wrote to memory of 1084 296 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 31 PID 1608 wrote to memory of 1116 1608 boadeguxuv.exe 23 PID 1608 wrote to memory of 1116 1608 boadeguxuv.exe 23 PID 1608 wrote to memory of 1116 1608 boadeguxuv.exe 23 PID 1608 wrote to memory of 1116 1608 boadeguxuv.exe 23 PID 1608 wrote to memory of 1116 1608 boadeguxuv.exe 23 PID 1608 wrote to memory of 1168 1608 boadeguxuv.exe 22 PID 1608 wrote to memory of 1168 1608 boadeguxuv.exe 22 PID 1608 wrote to memory of 1168 1608 boadeguxuv.exe 22 PID 1608 wrote to memory of 1168 1608 boadeguxuv.exe 22 PID 1608 wrote to memory of 1168 1608 boadeguxuv.exe 22 PID 1608 wrote to memory of 1236 1608 boadeguxuv.exe 21 PID 1608 wrote to memory of 1236 1608 boadeguxuv.exe 21 PID 1608 wrote to memory of 1236 1608 boadeguxuv.exe 21 PID 1608 wrote to memory of 1236 1608 boadeguxuv.exe 21 PID 1608 wrote to memory of 1236 1608 boadeguxuv.exe 21 PID 1608 wrote to memory of 336 1608 boadeguxuv.exe 33 PID 1608 wrote to memory of 336 1608 boadeguxuv.exe 33 PID 1608 wrote to memory of 336 1608 boadeguxuv.exe 33 PID 1608 wrote to memory of 336 1608 boadeguxuv.exe 33 PID 1608 wrote to memory of 336 1608 boadeguxuv.exe 33 PID 1608 wrote to memory of 644 1608 boadeguxuv.exe 35 PID 1608 wrote to memory of 644 1608 boadeguxuv.exe 35 PID 1608 wrote to memory of 644 1608 boadeguxuv.exe 35 PID 1608 wrote to memory of 644 1608 boadeguxuv.exe 35 PID 1608 wrote to memory of 644 1608 boadeguxuv.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe"C:\Users\Admin\AppData\Local\Temp\aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe"1⤵
- Drops autorun.inf file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe"C:\Users\Admin\AppData\Local\Temp\aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Users\Admin\AppData\Roaming\Asruykhyqe\boadeguxuv.exe"C:\Users\Admin\AppData\Roaming\Asruykhyqe\boadeguxuv.exe"3⤵
- Executes dropped EXE
- Drops autorun.inf file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Roaming\Asruykhyqe\boadeguxuv.exe"C:\Users\Admin\AppData\Roaming\Asruykhyqe\boadeguxuv.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp4f175a07.bat"3⤵
- Deletes itself
PID:1084
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:336
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD563419c91ea7a480ca9fead2f7036baf8
SHA1137934722ca47f917a8f9a2b60d542d98548c7a5
SHA256109b5b57ca94de2a38077cf30e43bfcca1eeb27f5f83c6c9305a49def9bc42d8
SHA5125232ceb7083fa0f8034fc32e261201a68fd657f971c092a4321c01a0134cd6b63bfe2c885f8d9b313f4df035e3b89ac253d9b805e29e2eb4d2e0fd8fe9b09acc
-
Filesize
307B
MD59b219dda1a9e02d12ca7ddfcd24f73e1
SHA191fa7fb8de0b32bbc4cdcd077c7e124251acee97
SHA256d0fd09d8b2411ab6fcd49dfad88176f8ad67257ec96826e44b3f615c99be1193
SHA512ec13e61917b13d0365d44ba4bf59e94ad380be825a3bed85b383214197e3b769114ab0dae56806dd1a94014f0f31e5b27321a3601d377352e380c89bbe6e5173
-
Filesize
345KB
MD594cad6b0ab977d47a9b98169dd57e625
SHA193c4d87c134c22b2778822f45b8dc9f943742fc8
SHA256f88dfef9fe974400857a7ffe3bd5a773dbedbdf5a04c53a2b9d8827b973c298e
SHA51281f69fa5ebe838cf5cd484b178ab481aceefc5ed7791bd74728dce2ffece86f70a488b82f73c2962d4903a155b698012f7537d81144f8580475a0bd45929558e
-
Filesize
345KB
MD594cad6b0ab977d47a9b98169dd57e625
SHA193c4d87c134c22b2778822f45b8dc9f943742fc8
SHA256f88dfef9fe974400857a7ffe3bd5a773dbedbdf5a04c53a2b9d8827b973c298e
SHA51281f69fa5ebe838cf5cd484b178ab481aceefc5ed7791bd74728dce2ffece86f70a488b82f73c2962d4903a155b698012f7537d81144f8580475a0bd45929558e
-
Filesize
345KB
MD594cad6b0ab977d47a9b98169dd57e625
SHA193c4d87c134c22b2778822f45b8dc9f943742fc8
SHA256f88dfef9fe974400857a7ffe3bd5a773dbedbdf5a04c53a2b9d8827b973c298e
SHA51281f69fa5ebe838cf5cd484b178ab481aceefc5ed7791bd74728dce2ffece86f70a488b82f73c2962d4903a155b698012f7537d81144f8580475a0bd45929558e
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
1.1MB
MD59b98d47916ead4f69ef51b56b0c2323c
SHA1290a80b4ded0efc0fd00816f373fcea81a521330
SHA25696e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b
SHA51268b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94
-
Filesize
1.1MB
MD59b98d47916ead4f69ef51b56b0c2323c
SHA1290a80b4ded0efc0fd00816f373fcea81a521330
SHA25696e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b
SHA51268b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
345KB
MD594cad6b0ab977d47a9b98169dd57e625
SHA193c4d87c134c22b2778822f45b8dc9f943742fc8
SHA256f88dfef9fe974400857a7ffe3bd5a773dbedbdf5a04c53a2b9d8827b973c298e
SHA51281f69fa5ebe838cf5cd484b178ab481aceefc5ed7791bd74728dce2ffece86f70a488b82f73c2962d4903a155b698012f7537d81144f8580475a0bd45929558e
-
Filesize
345KB
MD594cad6b0ab977d47a9b98169dd57e625
SHA193c4d87c134c22b2778822f45b8dc9f943742fc8
SHA256f88dfef9fe974400857a7ffe3bd5a773dbedbdf5a04c53a2b9d8827b973c298e
SHA51281f69fa5ebe838cf5cd484b178ab481aceefc5ed7791bd74728dce2ffece86f70a488b82f73c2962d4903a155b698012f7537d81144f8580475a0bd45929558e