Analysis
-
max time kernel
153s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 14:31
Static task
static1
Behavioral task
behavioral1
Sample
5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe
Resource
win10v2004-20221111-en
General
-
Target
5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe
-
Size
301KB
-
MD5
02983d1ee58659ef00f8224fa6f47140
-
SHA1
1fc597b182be27ae5b4cc8aba778d3bb3af98144
-
SHA256
5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa
-
SHA512
9659e33c67a4250f1f08d75d7af65fc72b672ca5ee672eca853266a2b9fe82045ac86b63df2ab7054c25a266b3b2c8ed71029cb43591538aec1607fbfff4a258
-
SSDEEP
6144:QFGJaxOE5IKV+JbS41CzuxhgdQMLVOQHHJfJrXM61a3FicnWV72ex:T8D5IK8P1CzhyMLZJZ1a3Ficn4Se
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 980 omzaha.exe -
Deletes itself 1 IoCs
pid Process 584 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run omzaha.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Omzaha = "C:\\Users\\Admin\\AppData\\Roaming\\Ijgi\\omzaha.exe" omzaha.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 268 set thread context of 584 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe 29 -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe 980 omzaha.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 268 wrote to memory of 980 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe 28 PID 268 wrote to memory of 980 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe 28 PID 268 wrote to memory of 980 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe 28 PID 268 wrote to memory of 980 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe 28 PID 980 wrote to memory of 1120 980 omzaha.exe 17 PID 980 wrote to memory of 1120 980 omzaha.exe 17 PID 980 wrote to memory of 1120 980 omzaha.exe 17 PID 980 wrote to memory of 1120 980 omzaha.exe 17 PID 980 wrote to memory of 1120 980 omzaha.exe 17 PID 980 wrote to memory of 1196 980 omzaha.exe 16 PID 980 wrote to memory of 1196 980 omzaha.exe 16 PID 980 wrote to memory of 1196 980 omzaha.exe 16 PID 980 wrote to memory of 1196 980 omzaha.exe 16 PID 980 wrote to memory of 1196 980 omzaha.exe 16 PID 980 wrote to memory of 1224 980 omzaha.exe 9 PID 980 wrote to memory of 1224 980 omzaha.exe 9 PID 980 wrote to memory of 1224 980 omzaha.exe 9 PID 980 wrote to memory of 1224 980 omzaha.exe 9 PID 980 wrote to memory of 1224 980 omzaha.exe 9 PID 980 wrote to memory of 268 980 omzaha.exe 20 PID 980 wrote to memory of 268 980 omzaha.exe 20 PID 980 wrote to memory of 268 980 omzaha.exe 20 PID 980 wrote to memory of 268 980 omzaha.exe 20 PID 980 wrote to memory of 268 980 omzaha.exe 20 PID 268 wrote to memory of 584 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe 29 PID 268 wrote to memory of 584 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe 29 PID 268 wrote to memory of 584 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe 29 PID 268 wrote to memory of 584 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe 29 PID 268 wrote to memory of 584 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe 29 PID 268 wrote to memory of 584 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe 29 PID 268 wrote to memory of 584 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe 29 PID 268 wrote to memory of 584 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe 29 PID 268 wrote to memory of 584 268 5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe"C:\Users\Admin\AppData\Local\Temp\5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Roaming\Ijgi\omzaha.exe"C:\Users\Admin\AppData\Roaming\Ijgi\omzaha.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:980
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\RQQE659.bat"3⤵
- Deletes itself
PID:584
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1196
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD5a540fe270e9027a135283f321710fad7
SHA1f2d3804cb18f0bfd8d3247c93effc63c0344410f
SHA256257d5df56acf2fcb4c37a08fd940bb5b3d6a6b8c7fe89a86feda507001939c39
SHA51275f3bb8ac7b60a8edc2f35cd14b55b22f2680f22664de26d0a3109525f079a15f4bd80b442322f672837ded979a71d27f699dbc636473cbd87f3cbcd3c369357
-
Filesize
301KB
MD525f4203cc361d4d25019d34e2b35fcf1
SHA15949c0c02a63c87fb46d0ea196802d1f97a97909
SHA256f011129bdc27850ea2a4c187924c6e9a2e15bfb9182e99f69ca27288a83c07f6
SHA512e1a58bf24d87a4c3b18df693a6b13f764ad11044b6d0a07ba8e1a28bb7b69bc7e3f74706608777de5617c847d54543868f849d95be6e41916491737de8930c14
-
Filesize
301KB
MD525f4203cc361d4d25019d34e2b35fcf1
SHA15949c0c02a63c87fb46d0ea196802d1f97a97909
SHA256f011129bdc27850ea2a4c187924c6e9a2e15bfb9182e99f69ca27288a83c07f6
SHA512e1a58bf24d87a4c3b18df693a6b13f764ad11044b6d0a07ba8e1a28bb7b69bc7e3f74706608777de5617c847d54543868f849d95be6e41916491737de8930c14
-
Filesize
301KB
MD525f4203cc361d4d25019d34e2b35fcf1
SHA15949c0c02a63c87fb46d0ea196802d1f97a97909
SHA256f011129bdc27850ea2a4c187924c6e9a2e15bfb9182e99f69ca27288a83c07f6
SHA512e1a58bf24d87a4c3b18df693a6b13f764ad11044b6d0a07ba8e1a28bb7b69bc7e3f74706608777de5617c847d54543868f849d95be6e41916491737de8930c14
-
Filesize
301KB
MD525f4203cc361d4d25019d34e2b35fcf1
SHA15949c0c02a63c87fb46d0ea196802d1f97a97909
SHA256f011129bdc27850ea2a4c187924c6e9a2e15bfb9182e99f69ca27288a83c07f6
SHA512e1a58bf24d87a4c3b18df693a6b13f764ad11044b6d0a07ba8e1a28bb7b69bc7e3f74706608777de5617c847d54543868f849d95be6e41916491737de8930c14