Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 05:06
Behavioral task
behavioral1
Sample
0f8e8bd5344501465561ea05cfdaf556.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f8e8bd5344501465561ea05cfdaf556.exe
Resource
win10v2004-20231215-en
General
-
Target
0f8e8bd5344501465561ea05cfdaf556.exe
-
Size
225KB
-
MD5
0f8e8bd5344501465561ea05cfdaf556
-
SHA1
f57672d10a0d3d6bd30791330088cbaedb82a362
-
SHA256
a3bb9b4090251112e1bc75a6cfa453c17008f495732dfaf1b57697a31bf453ce
-
SHA512
56b3c3920afb24024ccb0a60a123463c6418116de6334dbce7a02c3d120c1d8ba964dbf6d7d8ac5ba84dfd17c2f3fb9e59ae018d25271daa9fc4286e92b54740
-
SSDEEP
6144:U8ww6nXCqZ+dV6SR9zfyOuOEuF6vaemGcsoS:U8wwYXxMdV6SnTyO+YIcsoS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
n6205vcy.exepid process 1640 n6205vcy.exe -
Loads dropped DLL 1 IoCs
Processes:
0f8e8bd5344501465561ea05cfdaf556.exepid process 1436 0f8e8bd5344501465561ea05cfdaf556.exe -
Processes:
resource yara_rule behavioral1/memory/1436-0-0x0000000000400000-0x000000000044F000-memory.dmp upx \Users\Admin\AppData\Roaming\n6205vcy.exe upx behavioral1/memory/1640-11-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1436-6-0x00000000002B0000-0x00000000002FF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0f8e8bd5344501465561ea05cfdaf556.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\n6205vcy.exe = "C:\\Users\\Admin\\AppData\\Roaming\\n6205vcy.exe" 0f8e8bd5344501465561ea05cfdaf556.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
n6205vcy.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch n6205vcy.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" n6205vcy.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main n6205vcy.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
n6205vcy.exepid process 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe 1640 n6205vcy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
n6205vcy.exepid process 1640 n6205vcy.exe 1640 n6205vcy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
0f8e8bd5344501465561ea05cfdaf556.exedescription pid process target process PID 1436 wrote to memory of 1640 1436 0f8e8bd5344501465561ea05cfdaf556.exe n6205vcy.exe PID 1436 wrote to memory of 1640 1436 0f8e8bd5344501465561ea05cfdaf556.exe n6205vcy.exe PID 1436 wrote to memory of 1640 1436 0f8e8bd5344501465561ea05cfdaf556.exe n6205vcy.exe PID 1436 wrote to memory of 1640 1436 0f8e8bd5344501465561ea05cfdaf556.exe n6205vcy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f8e8bd5344501465561ea05cfdaf556.exe"C:\Users\Admin\AppData\Local\Temp\0f8e8bd5344501465561ea05cfdaf556.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\n6205vcy.exe"C:\Users\Admin\AppData\Roaming\n6205vcy.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\ib2[1].htmFilesize
162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
\Users\Admin\AppData\Roaming\n6205vcy.exeFilesize
225KB
MD50f8e8bd5344501465561ea05cfdaf556
SHA1f57672d10a0d3d6bd30791330088cbaedb82a362
SHA256a3bb9b4090251112e1bc75a6cfa453c17008f495732dfaf1b57697a31bf453ce
SHA51256b3c3920afb24024ccb0a60a123463c6418116de6334dbce7a02c3d120c1d8ba964dbf6d7d8ac5ba84dfd17c2f3fb9e59ae018d25271daa9fc4286e92b54740
-
memory/1436-1-0x0000000000230000-0x0000000000245000-memory.dmpFilesize
84KB
-
memory/1436-2-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1436-9-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1436-0-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1436-6-0x00000000002B0000-0x00000000002FF000-memory.dmpFilesize
316KB
-
memory/1640-39-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1640-55-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1640-35-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1640-11-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1640-43-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1640-47-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1640-51-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1640-31-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1640-58-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1640-62-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1640-66-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1640-70-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1640-75-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1640-79-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1640-83-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB