Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    14-11-2023 18:52

General

  • Target

    05a7a349e3cf602aa1b8f5162b5d82ecb2be9cab68186c1abf53bb38c132dd97.exe

  • Size

    5.9MB

  • MD5

    64e7cd89bb30e3e4ff61954b1eaaa75c

  • SHA1

    f8d19c2493acf007b4dcb045501ef650d4d4a6c4

  • SHA256

    05a7a349e3cf602aa1b8f5162b5d82ecb2be9cab68186c1abf53bb38c132dd97

  • SHA512

    65fa366f0d34624f12feb02e2d0b9842488db8c4b7e85207b7f1c9f213f8c22301dbfdf2e5ea63d5bdee3deeec64d979b2c732c2a13c39cb2c8aeab6e24d2b34

  • SSDEEP

    12288:0XgvmzFHi0mo5aH0qMzd58lv7FVPJQPDHvd:0XgvOHi0mGaH0qSdaFn4V

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 28 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05a7a349e3cf602aa1b8f5162b5d82ecb2be9cab68186c1abf53bb38c132dd97.exe
    "C:\Users\Admin\AppData\Local\Temp\05a7a349e3cf602aa1b8f5162b5d82ecb2be9cab68186c1abf53bb38c132dd97.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2176
    • C:\Users\Admin\AppData\Local\Temp\ybpqekp.exe
      "C:\Users\Admin\AppData\Local\Temp\ybpqekp.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:2056
    • C:\Users\Admin\AppData\Local\Temp\ybpqekp.exe
      "C:\Users\Admin\AppData\Local\Temp\ybpqekp.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • System policy modification
      PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\bxeyfeccczstjmbhehbxey.ecc

    Filesize

    280B

    MD5

    ade4ad63a57d8d78ec399ee30d7d088f

    SHA1

    47d0487c18fa639020393ee4c7fd4fc44245ed81

    SHA256

    048bed3b7fcabd96504f30f7caa6f9295ac75b4fa428359807255f8d2a9e8dfd

    SHA512

    790e53db5f0161f2ac4a5f71f3bb7590d1abdd179ddb4f742ed21bd52a8674e4d81b9f50fd71c165bbf18c6e2a7d2d47e4dbecd13d92d38679978953e052d728

  • C:\Program Files (x86)\bxeyfeccczstjmbhehbxey.ecc

    Filesize

    280B

    MD5

    787b375eca98529542c119fb1e72182b

    SHA1

    8157f33f4868f7e250389fd81d5b36f7ca948d9c

    SHA256

    3323bcdaa6cad71e93d0dfca205bba04e35ab166b091d6e3c7b139e9b50a0a8b

    SHA512

    ca939461655874eb95033609fd7aca69e54a70813f28da4b77d0af576404dd7d9b83dc31ee36937d0dc3f4892f470a4b56c2b7a5634f1a9681cec8b02a3d9620

  • C:\Program Files (x86)\bxeyfeccczstjmbhehbxey.ecc

    Filesize

    280B

    MD5

    e53b7dbc267403783fcbc3f4f81d4e8a

    SHA1

    c7bfa3d17e751b3639db56f8ec6f4d39b9d4f0f4

    SHA256

    7bf7f6f0509ce75587f9d751ae6c545da7dcebffaecd5c7381d7ab660f3146dd

    SHA512

    8bf82dca5a47990f9b40bef4ed8ef6c74b03b0adc7ba9bfbaf1ff4ca2fe653af2cf1a333348ac3ef938d2714616d4d2b8620f3bc46f70ede67fc0b05497ee2f7

  • C:\Users\Admin\AppData\Local\Temp\ybpqekp.exe

    Filesize

    7.7MB

    MD5

    d5d8829bfcd9f56c9387386f72e2864e

    SHA1

    145dd1c5b1547950999f57650751bc32aa09f6c0

    SHA256

    bdcd82a5ccb5f5c9a6248ebba463427a3778adeda441fc1ac964582804228478

    SHA512

    07529b9dffbf1bb1c56694031ef27ac3e8b56b66ea01c065e774c04b0a634953c639997b29d41fc8e8227d3301c99a67a5a5f8b4d01c83c75dfdc120140bc9d9

  • C:\Users\Admin\AppData\Local\Temp\ybpqekp.exe

    Filesize

    7.7MB

    MD5

    d5d8829bfcd9f56c9387386f72e2864e

    SHA1

    145dd1c5b1547950999f57650751bc32aa09f6c0

    SHA256

    bdcd82a5ccb5f5c9a6248ebba463427a3778adeda441fc1ac964582804228478

    SHA512

    07529b9dffbf1bb1c56694031ef27ac3e8b56b66ea01c065e774c04b0a634953c639997b29d41fc8e8227d3301c99a67a5a5f8b4d01c83c75dfdc120140bc9d9

  • C:\Users\Admin\AppData\Local\Temp\ybpqekp.exe

    Filesize

    7.7MB

    MD5

    d5d8829bfcd9f56c9387386f72e2864e

    SHA1

    145dd1c5b1547950999f57650751bc32aa09f6c0

    SHA256

    bdcd82a5ccb5f5c9a6248ebba463427a3778adeda441fc1ac964582804228478

    SHA512

    07529b9dffbf1bb1c56694031ef27ac3e8b56b66ea01c065e774c04b0a634953c639997b29d41fc8e8227d3301c99a67a5a5f8b4d01c83c75dfdc120140bc9d9

  • C:\Users\Admin\AppData\Local\bxeyfeccczstjmbhehbxey.ecc

    Filesize

    280B

    MD5

    1366557583328e0f7844f64a2c77d8d0

    SHA1

    a4d42d89ba33d11b8fb075e4e4f31c4a7cbf7e8c

    SHA256

    98fe8acc04390ad6e4ab2240295156aa714b9c27aabd25f7fbc315d29ae9b978

    SHA512

    7ce61deb4f823eea65d7bafb54be3f1f61fac43c7cce9f0ed478ed8ad0a56f16cb4eefe61e789c55ad25da5be8e7b2d10912b1e973feacac0a6841e4da5212ef

  • C:\Users\Admin\AppData\Local\bxeyfeccczstjmbhehbxey.ecc

    Filesize

    280B

    MD5

    767e497494cd461d895b9dd785efaab1

    SHA1

    ad2bdc8d8ad787c88a1c3ac6ada3bbe83fda9eb7

    SHA256

    066b9b79e6e4c4254759f400111c838394c14895fe2189a270a55eb57273c864

    SHA512

    f217af86800ef6e770566367c8ea64499666aff3c6a5f958b2c01bb0d4d4e8e89520a48bef7e38f48c8ef855cd215200b4ec25104b643b7d783f36843a75d550

  • C:\Users\Admin\AppData\Local\bxeyfeccczstjmbhehbxey.ecc

    Filesize

    280B

    MD5

    d18d1549cec855ea8e99fa8974b18df5

    SHA1

    196adf8e86bedf3f5b69aed409fd0b990349c474

    SHA256

    2c3c0c6af8e2efb15f6877d3d3cacf51b0a758d2fd65a9ec76c3bc356b2c89d5

    SHA512

    6d55677ebd348f1268bfdad53f423fb6ff884fbd669953b7fdeaf0bea3c71dffbe8aa7b4223eb066a57b34b6cc3485bc978ae3d793ed900800e8f6fa825a4663

  • C:\Users\Admin\AppData\Local\bxeyfeccczstjmbhehbxey.ecc

    Filesize

    280B

    MD5

    f6134d2ca1f4bb03273533564ad8c848

    SHA1

    0453faa8a6b49a4566eb39347ad0b0e5b1292507

    SHA256

    09e188dc475d28ec4d308178f787820e00c6bbae64fd79ae987f4060afe01e99

    SHA512

    95acf08490d202c97a4b105e21131c0c723ab4190b2e6cf9de95aea433107324a075dc4ba395a8d3bd380eb8abc896ad56f0ee8525aa70b64f8d3c54e04356db

  • C:\Users\Admin\AppData\Local\bxeyfeccczstjmbhehbxey.ecc

    Filesize

    280B

    MD5

    f7bd84fb81e305bfef077dd46615842e

    SHA1

    4726de0543d45cab9fda674128c612f5a18c617c

    SHA256

    6b930f7db1f4cb71a85261c44d06e58e30fae815a9b886044e2a00019b69cc0c

    SHA512

    e293c9fef4b3f8a0e7b9bf4248d21f655498c9933385022416e5b9aa05fd0c1a82bb2de45dbce7551d9a0aea766e53888b829081239b51e2c40be711d358837d

  • C:\Users\Admin\AppData\Local\szrwoyhsdlpbcqqhpdiphmeoxitbfrsgg.fty

    Filesize

    4KB

    MD5

    89fc2d42fff653f154d8f05796a6449d

    SHA1

    31a9e27ccbefda65a6673893b9b2bfd9fed5a6d3

    SHA256

    0161451cfb27d96dfa8994a18ef7cdb1d11dccf870e08b33af8a8706389c8315

    SHA512

    34ba60d7c4f368e89b66d14b978e6230f7bbcb4ea43e6fd4c87e68263be0f8a1de9e784f58db881aea8070fc4679a8bd6bed752a00187c72d778786ae81471ab

  • \Users\Admin\AppData\Local\Temp\ybpqekp.exe

    Filesize

    7.7MB

    MD5

    d5d8829bfcd9f56c9387386f72e2864e

    SHA1

    145dd1c5b1547950999f57650751bc32aa09f6c0

    SHA256

    bdcd82a5ccb5f5c9a6248ebba463427a3778adeda441fc1ac964582804228478

    SHA512

    07529b9dffbf1bb1c56694031ef27ac3e8b56b66ea01c065e774c04b0a634953c639997b29d41fc8e8227d3301c99a67a5a5f8b4d01c83c75dfdc120140bc9d9

  • \Users\Admin\AppData\Local\Temp\ybpqekp.exe

    Filesize

    7.7MB

    MD5

    d5d8829bfcd9f56c9387386f72e2864e

    SHA1

    145dd1c5b1547950999f57650751bc32aa09f6c0

    SHA256

    bdcd82a5ccb5f5c9a6248ebba463427a3778adeda441fc1ac964582804228478

    SHA512

    07529b9dffbf1bb1c56694031ef27ac3e8b56b66ea01c065e774c04b0a634953c639997b29d41fc8e8227d3301c99a67a5a5f8b4d01c83c75dfdc120140bc9d9

  • \Users\Admin\AppData\Local\Temp\ybpqekp.exe

    Filesize

    7.7MB

    MD5

    d5d8829bfcd9f56c9387386f72e2864e

    SHA1

    145dd1c5b1547950999f57650751bc32aa09f6c0

    SHA256

    bdcd82a5ccb5f5c9a6248ebba463427a3778adeda441fc1ac964582804228478

    SHA512

    07529b9dffbf1bb1c56694031ef27ac3e8b56b66ea01c065e774c04b0a634953c639997b29d41fc8e8227d3301c99a67a5a5f8b4d01c83c75dfdc120140bc9d9

  • \Users\Admin\AppData\Local\Temp\ybpqekp.exe

    Filesize

    7.7MB

    MD5

    d5d8829bfcd9f56c9387386f72e2864e

    SHA1

    145dd1c5b1547950999f57650751bc32aa09f6c0

    SHA256

    bdcd82a5ccb5f5c9a6248ebba463427a3778adeda441fc1ac964582804228478

    SHA512

    07529b9dffbf1bb1c56694031ef27ac3e8b56b66ea01c065e774c04b0a634953c639997b29d41fc8e8227d3301c99a67a5a5f8b4d01c83c75dfdc120140bc9d9