Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 15:02
Behavioral task
behavioral1
Sample
ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe
-
Size
476KB
-
MD5
ea0cf0a560a8c73d543e3dc2c0be0746
-
SHA1
c680dfd744d3537844193b611777c8f5ba5ac387
-
SHA256
4b4069bc462e10031185e70d3a9fad2a266e708e1f2d55d3890e7442b0e2344f
-
SHA512
305e5fe3028598ce67a451526866d6e1fcd85da4acdb697a38914abce3b44e3f1787c82b49cc2bcfaddf920b5e15f413d287be9e5a9993f69a686b11134d7a4d
-
SSDEEP
6144:WdspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70Nqr:s8kxNhOZElO5kkWjhD4AI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2556 OYS.EXE -
Loads dropped DLL 2 IoCs
pid Process 2252 ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe 2252 ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe -
resource yara_rule behavioral1/memory/2252-0-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/files/0x0007000000014b5f-11.dat upx behavioral1/files/0x000900000000e621-19.dat upx behavioral1/files/0x000900000000e621-21.dat upx behavioral1/files/0x000900000000e621-26.dat upx behavioral1/memory/2556-27-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/files/0x000900000000e621-29.dat upx behavioral1/memory/2252-31-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2556-30-0x0000000000400000-0x0000000000470000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SYUW.EXE = "C:\\Program Files\\SYUW.EXE" ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe -
Enumerates connected drives 3 TTPs 34 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\O: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\T: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\E: OYS.EXE File opened (read-only) \??\T: OYS.EXE File opened (read-only) \??\G: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\H: OYS.EXE File opened (read-only) \??\K: OYS.EXE File opened (read-only) \??\L: OYS.EXE File opened (read-only) \??\N: OYS.EXE File opened (read-only) \??\P: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\R: OYS.EXE File opened (read-only) \??\M: OYS.EXE File opened (read-only) \??\I: OYS.EXE File opened (read-only) \??\J: OYS.EXE File opened (read-only) \??\S: OYS.EXE File opened (read-only) \??\V: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\Q: OYS.EXE File opened (read-only) \??\G: OYS.EXE File opened (read-only) \??\J: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\S: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\P: OYS.EXE File opened (read-only) \??\V: OYS.EXE File opened (read-only) \??\E: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\M: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\N: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\Q: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\U: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\O: OYS.EXE File opened (read-only) \??\K: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\L: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\R: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File opened (read-only) \??\U: OYS.EXE File opened (read-only) \??\H: ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\EANC.EXE ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File created C:\Program Files\SYUW.EXE ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File created C:\Program Files (x86)\ZGZAJ.EXE ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File created C:\Program Files\SWEJL.EXE ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\LKAZCHG.EXE ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File created C:\Windows\ZIHTUHA.EXE ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe File created C:\Windows\LMQMXOB.EXE ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe -
Modifies registry class 32 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command\ = "C:\\Program Files\\EANC.EXE %1" ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command\ = "C:\\Windows\\LKAZCHG.EXE %1" ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile OYS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "C:\\Windows\\ZIHTUHA.EXE \"%1\"" ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command OYS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open OYS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell OYS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command OYS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open OYS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Program Files (x86)\\ZGZAJ.EXE %1" ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell OYS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command OYS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "C:\\Program Files\\SWEJL.EXE \"%1\"" ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open OYS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell OYS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command OYS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile OYS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile OYS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "C:\\Windows\\LMQMXOB.EXE \"%1\" %*" ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open OYS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file OYS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell OYS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2556 2252 ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe 28 PID 2252 wrote to memory of 2556 2252 ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe 28 PID 2252 wrote to memory of 2556 2252 ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe 28 PID 2252 wrote to memory of 2556 2252 ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe"C:\Users\Admin\AppData\Local\Temp\ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\$Recycle.Bin\OYS.EXEC:\$Recycle.Bin\OYS.EXE2⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD5b03f51d26cf9ff70e6184e402b38bebf
SHA120e27b69c8c716d891bf440fd1302933b8304d2d
SHA256468017ee498c1c5e08123ff7b5414f248e81680ae597c4dc293f1033c31d49b2
SHA5126cdcd41521b4b1b8601eaeb6ecc351ca239b7fd34cf818abed5b3223fdfa6d3b52646a5aaf6436a6bd7769aa3e3534da3c3af4a7e560363e4b2b19906b927bd9
-
Filesize
476KB
MD5b03f51d26cf9ff70e6184e402b38bebf
SHA120e27b69c8c716d891bf440fd1302933b8304d2d
SHA256468017ee498c1c5e08123ff7b5414f248e81680ae597c4dc293f1033c31d49b2
SHA5126cdcd41521b4b1b8601eaeb6ecc351ca239b7fd34cf818abed5b3223fdfa6d3b52646a5aaf6436a6bd7769aa3e3534da3c3af4a7e560363e4b2b19906b927bd9
-
Filesize
477KB
MD58f476ed5a93c84992f0391202617e265
SHA14be0c6f9145ecedfc2c778e5015b2490767d2793
SHA2565477be09f58acf0d4848a5e382a3f1ac8a9513a46625a93f4e54631c4486d88a
SHA512e646bf20c3251a5fb0f5a4ebae2894baa5a7e499c39d0be30f0bc891bb6e8e7c5ea0b04ca1a9420d429765644588e719189bf6873401aacb7cd7c643ee6ebc2e
-
Filesize
476KB
MD5b03f51d26cf9ff70e6184e402b38bebf
SHA120e27b69c8c716d891bf440fd1302933b8304d2d
SHA256468017ee498c1c5e08123ff7b5414f248e81680ae597c4dc293f1033c31d49b2
SHA5126cdcd41521b4b1b8601eaeb6ecc351ca239b7fd34cf818abed5b3223fdfa6d3b52646a5aaf6436a6bd7769aa3e3534da3c3af4a7e560363e4b2b19906b927bd9
-
Filesize
476KB
MD5b03f51d26cf9ff70e6184e402b38bebf
SHA120e27b69c8c716d891bf440fd1302933b8304d2d
SHA256468017ee498c1c5e08123ff7b5414f248e81680ae597c4dc293f1033c31d49b2
SHA5126cdcd41521b4b1b8601eaeb6ecc351ca239b7fd34cf818abed5b3223fdfa6d3b52646a5aaf6436a6bd7769aa3e3534da3c3af4a7e560363e4b2b19906b927bd9