Analysis
-
max time kernel
151s -
max time network
105s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 10:45
Static task
static1
Behavioral task
behavioral1
Sample
fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe
Resource
win10v2004-20221111-en
General
-
Target
fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe
-
Size
351KB
-
MD5
20338f738bd066961ae639e0820c6f5e
-
SHA1
a7945be15e1cceb9cfc70efb6956951ede4b1eb0
-
SHA256
fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f
-
SHA512
1fe569ce8ec1a32efd65e662a2311e142acd0bf818b9c3f3a43f2725010d5227b23a45d6d7eb1871def1270fb6ad6a111246da4033e47a01058d1148517c7b57
-
SSDEEP
6144:Z3c4cg0RO2MEzoqeAYd2eGBysYgeOnVvZ33rXjIzPD:ZiBTMbAm2tBxeOnVvZHgzPD
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2028 FyGAMjyYP.exe 1324 FyGAMjyYP.exe -
Deletes itself 1 IoCs
pid Process 1324 FyGAMjyYP.exe -
Loads dropped DLL 4 IoCs
pid Process 860 fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe 860 fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe 860 fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe 1324 FyGAMjyYP.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\IYmfwffcJZQqXBq = "C:\\ProgramData\\DA73TrdFRfOTiNx\\FyGAMjyYP.exe" fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1428 set thread context of 860 1428 fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe 27 PID 2028 set thread context of 1324 2028 FyGAMjyYP.exe 29 PID 1324 set thread context of 972 1324 FyGAMjyYP.exe 31 -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1428 wrote to memory of 860 1428 fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe 27 PID 1428 wrote to memory of 860 1428 fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe 27 PID 1428 wrote to memory of 860 1428 fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe 27 PID 1428 wrote to memory of 860 1428 fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe 27 PID 1428 wrote to memory of 860 1428 fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe 27 PID 1428 wrote to memory of 860 1428 fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe 27 PID 860 wrote to memory of 2028 860 fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe 28 PID 860 wrote to memory of 2028 860 fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe 28 PID 860 wrote to memory of 2028 860 fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe 28 PID 860 wrote to memory of 2028 860 fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe 28 PID 2028 wrote to memory of 1324 2028 FyGAMjyYP.exe 29 PID 2028 wrote to memory of 1324 2028 FyGAMjyYP.exe 29 PID 2028 wrote to memory of 1324 2028 FyGAMjyYP.exe 29 PID 2028 wrote to memory of 1324 2028 FyGAMjyYP.exe 29 PID 2028 wrote to memory of 1324 2028 FyGAMjyYP.exe 29 PID 2028 wrote to memory of 1324 2028 FyGAMjyYP.exe 29 PID 1324 wrote to memory of 288 1324 FyGAMjyYP.exe 30 PID 1324 wrote to memory of 288 1324 FyGAMjyYP.exe 30 PID 1324 wrote to memory of 288 1324 FyGAMjyYP.exe 30 PID 1324 wrote to memory of 288 1324 FyGAMjyYP.exe 30 PID 1324 wrote to memory of 972 1324 FyGAMjyYP.exe 31 PID 1324 wrote to memory of 972 1324 FyGAMjyYP.exe 31 PID 1324 wrote to memory of 972 1324 FyGAMjyYP.exe 31 PID 1324 wrote to memory of 972 1324 FyGAMjyYP.exe 31 PID 1324 wrote to memory of 972 1324 FyGAMjyYP.exe 31 PID 1324 wrote to memory of 972 1324 FyGAMjyYP.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe"C:\Users\Admin\AppData\Local\Temp\fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe"C:\Users\Admin\AppData\Local\Temp\fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:860 -
C:\ProgramData\DA73TrdFRfOTiNx\FyGAMjyYP.exe"C:\ProgramData\DA73TrdFRfOTiNx\FyGAMjyYP.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\ProgramData\DA73TrdFRfOTiNx\FyGAMjyYP.exe"C:\ProgramData\DA73TrdFRfOTiNx\FyGAMjyYP.exe"4⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe" /i:13245⤵PID:288
-
-
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" /i:13245⤵PID:972
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
351KB
MD5f87940c719f1d65d486e95522faa8ea1
SHA1db0051e64aa325c083608db6aada6bae5cdfd3ab
SHA256e87298a8686170a5a6c3baf6fb441c049fe8d61069bf65d2a2c465d7b53442e9
SHA512ea5e340acbe438a421d8d70f9ee0fa950b742da98779a73c2b439e6e39ed7f6adf92592736eb556330e49171aead5c45533b9f43201d4697ce7bf054da5579c5
-
Filesize
351KB
MD5f87940c719f1d65d486e95522faa8ea1
SHA1db0051e64aa325c083608db6aada6bae5cdfd3ab
SHA256e87298a8686170a5a6c3baf6fb441c049fe8d61069bf65d2a2c465d7b53442e9
SHA512ea5e340acbe438a421d8d70f9ee0fa950b742da98779a73c2b439e6e39ed7f6adf92592736eb556330e49171aead5c45533b9f43201d4697ce7bf054da5579c5
-
Filesize
351KB
MD5f87940c719f1d65d486e95522faa8ea1
SHA1db0051e64aa325c083608db6aada6bae5cdfd3ab
SHA256e87298a8686170a5a6c3baf6fb441c049fe8d61069bf65d2a2c465d7b53442e9
SHA512ea5e340acbe438a421d8d70f9ee0fa950b742da98779a73c2b439e6e39ed7f6adf92592736eb556330e49171aead5c45533b9f43201d4697ce7bf054da5579c5
-
Filesize
351KB
MD5f87940c719f1d65d486e95522faa8ea1
SHA1db0051e64aa325c083608db6aada6bae5cdfd3ab
SHA256e87298a8686170a5a6c3baf6fb441c049fe8d61069bf65d2a2c465d7b53442e9
SHA512ea5e340acbe438a421d8d70f9ee0fa950b742da98779a73c2b439e6e39ed7f6adf92592736eb556330e49171aead5c45533b9f43201d4697ce7bf054da5579c5
-
Filesize
351KB
MD5f87940c719f1d65d486e95522faa8ea1
SHA1db0051e64aa325c083608db6aada6bae5cdfd3ab
SHA256e87298a8686170a5a6c3baf6fb441c049fe8d61069bf65d2a2c465d7b53442e9
SHA512ea5e340acbe438a421d8d70f9ee0fa950b742da98779a73c2b439e6e39ed7f6adf92592736eb556330e49171aead5c45533b9f43201d4697ce7bf054da5579c5
-
Filesize
351KB
MD520338f738bd066961ae639e0820c6f5e
SHA1a7945be15e1cceb9cfc70efb6956951ede4b1eb0
SHA256fa7024d364d5e55b264682960cf0807d1ded4e917ca8614c4f2d027990ae5b4f
SHA5121fe569ce8ec1a32efd65e662a2311e142acd0bf818b9c3f3a43f2725010d5227b23a45d6d7eb1871def1270fb6ad6a111246da4033e47a01058d1148517c7b57
-
Filesize
351KB
MD5f87940c719f1d65d486e95522faa8ea1
SHA1db0051e64aa325c083608db6aada6bae5cdfd3ab
SHA256e87298a8686170a5a6c3baf6fb441c049fe8d61069bf65d2a2c465d7b53442e9
SHA512ea5e340acbe438a421d8d70f9ee0fa950b742da98779a73c2b439e6e39ed7f6adf92592736eb556330e49171aead5c45533b9f43201d4697ce7bf054da5579c5