Analysis
-
max time kernel
156s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064.exe
Resource
win10v2004-20220812-en
General
-
Target
bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064.exe
-
Size
231KB
-
MD5
ffa8e78e634fa8b2b98922f41acb02eb
-
SHA1
c325a7146fee2181b115e646d3f67d103d7baaf0
-
SHA256
bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064
-
SHA512
01ce9daf8a44ce64205392772cd9969d1828846ac84ccc8efd370cb69434f36071c64cbd8ecbde888fdd367cfa30d90c3f3d75a7dcdc1fd58ed0f6b0c426c228
-
SSDEEP
3072:/lexJLhbZkMe/C8yJ2STHRsXSNwLoqggaICZayLt87g09T2RZM:/gNXe5yJ2STxPC4gyZZz09T2Z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2232 Mdyraa.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Mdyraa.exe bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Mdyraa.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Mdyraa.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064.exe File created C:\Windows\Mdyraa.exe bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main Mdyraa.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\International Mdyraa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe 2232 Mdyraa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4060 bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064.exe 2232 Mdyraa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4060 wrote to memory of 2232 4060 bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064.exe 79 PID 4060 wrote to memory of 2232 4060 bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064.exe 79 PID 4060 wrote to memory of 2232 4060 bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064.exe"C:\Users\Admin\AppData\Local\Temp\bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\Mdyraa.exeC:\Windows\Mdyraa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2232
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5ffa8e78e634fa8b2b98922f41acb02eb
SHA1c325a7146fee2181b115e646d3f67d103d7baaf0
SHA256bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064
SHA51201ce9daf8a44ce64205392772cd9969d1828846ac84ccc8efd370cb69434f36071c64cbd8ecbde888fdd367cfa30d90c3f3d75a7dcdc1fd58ed0f6b0c426c228
-
Filesize
231KB
MD5ffa8e78e634fa8b2b98922f41acb02eb
SHA1c325a7146fee2181b115e646d3f67d103d7baaf0
SHA256bfe1b8e0bc3b213fcfec704d4f89f4310c47287482f689b31527ddd464a84064
SHA51201ce9daf8a44ce64205392772cd9969d1828846ac84ccc8efd370cb69434f36071c64cbd8ecbde888fdd367cfa30d90c3f3d75a7dcdc1fd58ed0f6b0c426c228
-
Filesize
426B
MD51526eb9f3c9dfa8f4f556baeef1583c8
SHA1a3533eaaa5e000ef3d87b6ba9118787c375d72f8
SHA25679fc94e05072b989339097ea335cf37e3c86c512de6a5aff715aec541ad6d515
SHA512fc0d2e6b7377ef619068a461c0463c894bcfe679fca5cfeb34f88a4eaf865dfed94408ce5db4dd509f0578e92b54da7457f967be12de55eaeb0eb7413aca0da5