Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 18:47
Behavioral task
behavioral1
Sample
e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe
Resource
win10v2004-20220812-en
General
-
Target
e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe
-
Size
191KB
-
MD5
b19c626641bd55b7051126ab7bd4914f
-
SHA1
3d7760017ce40a79ed3ef37a12e6680d65db0d08
-
SHA256
e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0
-
SHA512
12160ee1d87c62f544b50eb6bc7b0afb31d14db0cdecdc740b6e85cc4079f04961ef2443fe5432779c8c9758638fcc75af61c82c17584e10dbb29bcf84f34654
-
SSDEEP
3072:FhRkZpqJeb0DOpjf0KjfI75llhgyTh2A6ZW6VPetJYAUcByVxTKWvD8KBVz:FT0Qc0Or04IPlPd2AmVPYeAUcEvKWvDf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 788 ynza.exe -
resource yara_rule behavioral1/files/0x000b000000012300-55.dat upx behavioral1/files/0x000b000000012300-56.dat upx behavioral1/files/0x000b000000012300-58.dat upx behavioral1/files/0x000b000000012300-60.dat upx -
Deletes itself 1 IoCs
pid Process 1816 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\Currentversion\Run ynza.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7B4F18C8-4FEF-AD4D-3A07-B8B71A0C9BAA} = "C:\\Users\\Admin\\AppData\\Roaming\\Yqygjo\\ynza.exe" ynza.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2000 set thread context of 1816 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Privacy e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe 788 ynza.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe Token: SeSecurityPrivilege 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe Token: SeSecurityPrivilege 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2000 wrote to memory of 788 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe 28 PID 2000 wrote to memory of 788 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe 28 PID 2000 wrote to memory of 788 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe 28 PID 2000 wrote to memory of 788 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe 28 PID 788 wrote to memory of 1132 788 ynza.exe 18 PID 788 wrote to memory of 1132 788 ynza.exe 18 PID 788 wrote to memory of 1132 788 ynza.exe 18 PID 788 wrote to memory of 1132 788 ynza.exe 18 PID 788 wrote to memory of 1132 788 ynza.exe 18 PID 788 wrote to memory of 1184 788 ynza.exe 17 PID 788 wrote to memory of 1184 788 ynza.exe 17 PID 788 wrote to memory of 1184 788 ynza.exe 17 PID 788 wrote to memory of 1184 788 ynza.exe 17 PID 788 wrote to memory of 1184 788 ynza.exe 17 PID 788 wrote to memory of 1224 788 ynza.exe 16 PID 788 wrote to memory of 1224 788 ynza.exe 16 PID 788 wrote to memory of 1224 788 ynza.exe 16 PID 788 wrote to memory of 1224 788 ynza.exe 16 PID 788 wrote to memory of 1224 788 ynza.exe 16 PID 788 wrote to memory of 2000 788 ynza.exe 27 PID 788 wrote to memory of 2000 788 ynza.exe 27 PID 788 wrote to memory of 2000 788 ynza.exe 27 PID 788 wrote to memory of 2000 788 ynza.exe 27 PID 788 wrote to memory of 2000 788 ynza.exe 27 PID 2000 wrote to memory of 1816 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe 29 PID 2000 wrote to memory of 1816 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe 29 PID 2000 wrote to memory of 1816 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe 29 PID 2000 wrote to memory of 1816 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe 29 PID 2000 wrote to memory of 1816 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe 29 PID 2000 wrote to memory of 1816 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe 29 PID 2000 wrote to memory of 1816 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe 29 PID 2000 wrote to memory of 1816 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe 29 PID 2000 wrote to memory of 1816 2000 e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe"C:\Users\Admin\AppData\Local\Temp\e5fbf1d5a97b905e3214559f9eab16e85dca7a83ef37fb3fa0ae89fa973286a0.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\Yqygjo\ynza.exe"C:\Users\Admin\AppData\Roaming\Yqygjo\ynza.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:788
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpb01b2810.bat"3⤵
- Deletes itself
PID:1816
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5b4ad18f7d572ac5db9fb2fcfff73f19d
SHA1bf7cdc9762d242e734ff56fd57d4245622222f66
SHA2560272cbf1ef3562a1f1257a6a5bae54a7760bb560869e80caf482099a78a9b231
SHA5124f3e8b0b0b8ff3c97aec378299e21b5bbb36827a180efc083927882a0d56a65fb4708d06f86eb931a769664564ecbb7bcfa82047e75512aaf4a2a99de437ebf4
-
Filesize
398B
MD557658d1443b484f62dce0b6060ce3673
SHA16ff2c9cd9dbdf9412edf28d77d4371a34caa8d68
SHA25632637a0c98d3b79b3561ce8e5255a5007904dfd42d1376d76d0fedefdc95bd9c
SHA5121bda6318cb807942b60b581d26c7d2091945c27d9cbc9bf2d3297ba7faf39bdfcadd30b5bf9ddeff51fe03284cd6701a47c1e86f889efcf70522259a6b48a435
-
Filesize
191KB
MD5599bc0fdca78ec475ea1b337d8f29c06
SHA1eb972705bb311f80c999ac87e9f795fdf75a9ab8
SHA256667b090e5417feb4665e70e6e9a6787a5919c969d6c2858fc4b991a08981e234
SHA5120aa440b63d97e0c7230fa294725d96138d44fb6ab4a9055c508bf07ec9002271417aa0c7793d7659c5fbe2e6c9c01646c25cd991ee87d52c77d4f1abebbf29ef
-
Filesize
191KB
MD5599bc0fdca78ec475ea1b337d8f29c06
SHA1eb972705bb311f80c999ac87e9f795fdf75a9ab8
SHA256667b090e5417feb4665e70e6e9a6787a5919c969d6c2858fc4b991a08981e234
SHA5120aa440b63d97e0c7230fa294725d96138d44fb6ab4a9055c508bf07ec9002271417aa0c7793d7659c5fbe2e6c9c01646c25cd991ee87d52c77d4f1abebbf29ef
-
Filesize
191KB
MD5599bc0fdca78ec475ea1b337d8f29c06
SHA1eb972705bb311f80c999ac87e9f795fdf75a9ab8
SHA256667b090e5417feb4665e70e6e9a6787a5919c969d6c2858fc4b991a08981e234
SHA5120aa440b63d97e0c7230fa294725d96138d44fb6ab4a9055c508bf07ec9002271417aa0c7793d7659c5fbe2e6c9c01646c25cd991ee87d52c77d4f1abebbf29ef
-
Filesize
191KB
MD5599bc0fdca78ec475ea1b337d8f29c06
SHA1eb972705bb311f80c999ac87e9f795fdf75a9ab8
SHA256667b090e5417feb4665e70e6e9a6787a5919c969d6c2858fc4b991a08981e234
SHA5120aa440b63d97e0c7230fa294725d96138d44fb6ab4a9055c508bf07ec9002271417aa0c7793d7659c5fbe2e6c9c01646c25cd991ee87d52c77d4f1abebbf29ef