Analysis
-
max time kernel
121s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/08/2023, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
Ydhpqzk.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Ydhpqzk.exe
Resource
win10v2004-20230703-en
General
-
Target
Ydhpqzk.exe
-
Size
872KB
-
MD5
8e35dcf7017dd6c8142c620d335af447
-
SHA1
047df46dfe49db275d42fe05e6573885ff1d607d
-
SHA256
a5e1869c80baf7fa0f4290cf0339f63b1f1cd8c5a5b8851110cf523917109738
-
SHA512
b3b25af6a986df6aa1a143e038ea70f3691507236e21e5fef9c9b9ca74baacf6d8ff64cc8e60791e8664f055cb993edcc82729fc65c77de70c51abb7a50a2758
-
SSDEEP
24576:0ZsEl5sHWKZmUJgJlZv9yrJ/oSFLukHku:0Zl9rUJgZGJN+u
Malware Config
Extracted
Protocol: smtp- Host:
mail.sachingandhiarchitects.com - Port:
587 - Username:
[email protected] - Password:
devi060911
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cudsayebu = "C:\\Users\\Admin\\AppData\\Roaming\\Cudsayebu.exe" Ydhpqzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Run\EbJgI = "C:\\Users\\Admin\\AppData\\Roaming\\EbJgI\\EbJgI.exe" MSBuild.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2292 set thread context of 2512 2292 Ydhpqzk.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2512 MSBuild.exe 2512 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2292 Ydhpqzk.exe Token: SeDebugPrivilege 2512 MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2512 2292 Ydhpqzk.exe 28 PID 2292 wrote to memory of 2512 2292 Ydhpqzk.exe 28 PID 2292 wrote to memory of 2512 2292 Ydhpqzk.exe 28 PID 2292 wrote to memory of 2512 2292 Ydhpqzk.exe 28 PID 2292 wrote to memory of 2512 2292 Ydhpqzk.exe 28 PID 2292 wrote to memory of 2512 2292 Ydhpqzk.exe 28 PID 2292 wrote to memory of 2512 2292 Ydhpqzk.exe 28 PID 2292 wrote to memory of 2512 2292 Ydhpqzk.exe 28 PID 2292 wrote to memory of 2512 2292 Ydhpqzk.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ydhpqzk.exe"C:\Users\Admin\AppData\Local\Temp\Ydhpqzk.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e56ec378251cd65923ad88c1e14d0b6e
SHA17f5d986e0a34dd81487f6439fb0446ffa52a712e
SHA25632ccf567c07b62b6078cf03d097e21cbf7ef67a4ce312c9c34a47f865b3ad0a0
SHA5122737a622ca45b532aebc202184b3e35cde8684e5296cb1f008e7831921be2895a43f952c1df88d33011a7b9586aafbd88483f6c134cb5e8e98c236f5abb5f3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517718be0412944fd668c1b3eae30aab9
SHA12d841b1df36f2b8ec8261f4094b2e2df76a65910
SHA256697b24df264685609ff7e208c6d2f116dcb16c4b7b68e0173ff98891054288ed
SHA512b70733045d9f75dd35a28ae94db717b4a430d38c7b2c7306513d7a0c037b3c5b9c5f0f3e2a3a9d1052227daeb506531ecaca79fee9121091dc65e322fd50509f
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
163KB
MD519399ab248018076e27957e772bcfbab
SHA1faef897e02d9501146beb49f75da1caf12967b88
SHA256326842dd8731e37c8c27a08373c7ac341e6c72226cc850084e3a17d26675f3c9
SHA5126d5b12ec637ef4223fdd0e271cdc9f860b060ff08d380bba546ac6962b1d672003f9ae9556d65282d8083e830d4277bad8d16443720716077e542ab0262b0103