Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 14:35
Behavioral task
behavioral1
Sample
1b90dfb0e5ceecf88f138ef8e35b7d3e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1b90dfb0e5ceecf88f138ef8e35b7d3e.exe
Resource
win10v2004-20231215-en
General
-
Target
1b90dfb0e5ceecf88f138ef8e35b7d3e.exe
-
Size
146KB
-
MD5
1b90dfb0e5ceecf88f138ef8e35b7d3e
-
SHA1
b10a1d0f5734fddeac4a554ba90e266a18860bd4
-
SHA256
0323425a578f2c2440987eb0cbd9af1f50ad2f5b2667b56950fad52535aac911
-
SHA512
a6532860941589b4356db5fce035c869e0c512a8175a525083ecfecd5ff86d51b3cb07b6d824a60e79bc85355f2699708599b1026da73467b2772a0cef3f206a
-
SSDEEP
3072:3AFMfmv+OIfi8ANqtSdzwLhWpRPpwfM8m3+SZcsySm2+zEgU3dhWywAX:3AFMfmv+OqodPeU8W+itySmHKV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 852 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 qeyr.exe -
Loads dropped DLL 2 IoCs
pid Process 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe -
resource yara_rule behavioral1/files/0x00090000000141c0-6.dat upx behavioral1/memory/2784-12-0x0000000001E40000-0x0000000001E98000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\{34FDD602-B489-C607-A048-6F5816A32267} = "C:\\Users\\Admin\\AppData\\Roaming\\Izgo\\qeyr.exe" qeyr.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2784 set thread context of 852 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe 30 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe 3000 qeyr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe Token: SeSecurityPrivilege 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe Token: SeSecurityPrivilege 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2784 wrote to memory of 3000 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe 28 PID 2784 wrote to memory of 3000 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe 28 PID 2784 wrote to memory of 3000 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe 28 PID 2784 wrote to memory of 3000 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe 28 PID 3000 wrote to memory of 1236 3000 qeyr.exe 9 PID 3000 wrote to memory of 1236 3000 qeyr.exe 9 PID 3000 wrote to memory of 1236 3000 qeyr.exe 9 PID 3000 wrote to memory of 1236 3000 qeyr.exe 9 PID 3000 wrote to memory of 1236 3000 qeyr.exe 9 PID 3000 wrote to memory of 1328 3000 qeyr.exe 8 PID 3000 wrote to memory of 1328 3000 qeyr.exe 8 PID 3000 wrote to memory of 1328 3000 qeyr.exe 8 PID 3000 wrote to memory of 1328 3000 qeyr.exe 8 PID 3000 wrote to memory of 1328 3000 qeyr.exe 8 PID 3000 wrote to memory of 1368 3000 qeyr.exe 7 PID 3000 wrote to memory of 1368 3000 qeyr.exe 7 PID 3000 wrote to memory of 1368 3000 qeyr.exe 7 PID 3000 wrote to memory of 1368 3000 qeyr.exe 7 PID 3000 wrote to memory of 1368 3000 qeyr.exe 7 PID 3000 wrote to memory of 1104 3000 qeyr.exe 5 PID 3000 wrote to memory of 1104 3000 qeyr.exe 5 PID 3000 wrote to memory of 1104 3000 qeyr.exe 5 PID 3000 wrote to memory of 1104 3000 qeyr.exe 5 PID 3000 wrote to memory of 1104 3000 qeyr.exe 5 PID 3000 wrote to memory of 2784 3000 qeyr.exe 1 PID 3000 wrote to memory of 2784 3000 qeyr.exe 1 PID 3000 wrote to memory of 2784 3000 qeyr.exe 1 PID 3000 wrote to memory of 2784 3000 qeyr.exe 1 PID 3000 wrote to memory of 2784 3000 qeyr.exe 1 PID 2784 wrote to memory of 852 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe 30 PID 2784 wrote to memory of 852 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe 30 PID 2784 wrote to memory of 852 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe 30 PID 2784 wrote to memory of 852 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe 30 PID 2784 wrote to memory of 852 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe 30 PID 2784 wrote to memory of 852 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe 30 PID 2784 wrote to memory of 852 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe 30 PID 2784 wrote to memory of 852 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe 30 PID 2784 wrote to memory of 852 2784 1b90dfb0e5ceecf88f138ef8e35b7d3e.exe 30 PID 3000 wrote to memory of 2340 3000 qeyr.exe 31 PID 3000 wrote to memory of 2340 3000 qeyr.exe 31 PID 3000 wrote to memory of 2340 3000 qeyr.exe 31 PID 3000 wrote to memory of 2340 3000 qeyr.exe 31 PID 3000 wrote to memory of 2340 3000 qeyr.exe 31 PID 3000 wrote to memory of 972 3000 qeyr.exe 32 PID 3000 wrote to memory of 972 3000 qeyr.exe 32 PID 3000 wrote to memory of 972 3000 qeyr.exe 32 PID 3000 wrote to memory of 972 3000 qeyr.exe 32 PID 3000 wrote to memory of 972 3000 qeyr.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b90dfb0e5ceecf88f138ef8e35b7d3e.exe"C:\Users\Admin\AppData\Local\Temp\1b90dfb0e5ceecf88f138ef8e35b7d3e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\Izgo\qeyr.exe"C:\Users\Admin\AppData\Roaming\Izgo\qeyr.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3000
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpffc1753f.bat"2⤵
- Deletes itself
PID:852
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1104
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1328
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1236
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2340
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD59603fd881d797e03f1028505dee555f6
SHA16c81301c1f4ea1f086c9ec825d48a7dba5d0d275
SHA256ac81fd46186042403b0702e93362af5ae3f126b0f74d778fe90dc277547ee526
SHA512a27bb2c0203afe7150d1cf5a6a5bf0e942a7b12bfdf78d0f32691839c7bebeaaa9174fd1d428711b87f4be9638fc4629aae87ad053f311a5ec8d77220e52e39d