Analysis

  • max time kernel
    117s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2024 00:13

General

  • Target

    3f65a714f4db1d2f7d585abc7d60656d.exe

  • Size

    168KB

  • MD5

    3f65a714f4db1d2f7d585abc7d60656d

  • SHA1

    cb96a4d2eddde21a89e3d8ae98fc82fcbd5a1bdc

  • SHA256

    6b5315d5569d448773a9d4c334f22475bf820132f65c824b733a5a9fefa4f845

  • SHA512

    e64ad49d79fc59d98734766cf731d5c431635e960b023f288e2c3cd5214d13d54d303296eb0cf0f7d8c41da66e963293082ba7c261cd112f0260d19c9d474497

  • SSDEEP

    3072:8B/yfWqIm2ToinfY86s+g0Sfh2WYhdH2eluFkVZH7SLmRYqC:8ofU3tfpj0gRUdH2etB+L

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d.exe
    "C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d.exe
      "C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2308
  • C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d.exe
    "C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Roaming\Zyptps.exe
      "C:\Users\Admin\AppData\Roaming\Zyptps.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2820
  • C:\Users\Admin\AppData\Roaming\Zyptps.exe
    "C:\Users\Admin\AppData\Roaming\Zyptps.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2860
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1652
  • C:\Users\Admin\AppData\Roaming\Zyptps.exe
    "C:\Users\Admin\AppData\Roaming\Zyptps.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2804

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ced3c626f66125be8a18814d568de87f

    SHA1

    e871c146ce7fab89196ad5829be657010a7112b4

    SHA256

    85ed175873895f647bf3bad24b3f226c7cafef8e28bfc58d9c3dbeac9f541398

    SHA512

    5872248deb5b23409cf4edba438a5c87618e823ed1213a3b269d9273148a806ba08339617c2b1ccab5ff91169f795bead0d37edb797747ebf435d891660c09a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    055e10e29b7c5400f3107f5016ab15de

    SHA1

    2f47961e4be9aa18a27ae7f4de954d3a977c23eb

    SHA256

    aebfa7ce173a1622b220201d86eea8317f493caea3ea9a30b5f3338bcee43114

    SHA512

    974703d2a04b850f5d36a3524659358435abfb9802cb6d4a2c2513c90c84acda4156dbc48d3be3982b26a77dbf901aaa9cea26ef934b8e7c195dc7216938db77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6a98f2a5f233e727ac461a4acec917b0

    SHA1

    203ecc44219bce920cdcbf72b4cf6f282da80c04

    SHA256

    48e8bd1abacc72a53f661f4e81ec9f1e03938eed5b8ed3f9f9091c4dd0ef7d0a

    SHA512

    c396ef2ab4c8fedcadd1858cc5c3fedc80dbd622653762799b22eb8b79be5be86b329f224b59c6da738ed0be3ebf3ac6abd5d2be8b0b3ee1d347c1e4ee8e89ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    aa38104509c1ebd02064406a247364ec

    SHA1

    73f5e456cf20daa109e500f4cd8c74f70f62095d

    SHA256

    95b7d4fde7c5c7e3c2c4fc1c87ff7c65d8e4389fbc7c73d79a3c522a6e03f648

    SHA512

    3775e00188de14fa53678d06b93bc3968265d3d875b30f57c8402cf7aecdcd98aa1289c26ecc5b9a626d6309fa4cd86cff01bf654d9a6be2fb5127cf1fd4f4b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    5abf967a03beacdc27db3965d3206138

    SHA1

    9a3e2e386774b1eab16e2d435444d500d0753a3f

    SHA256

    7e23bdf33582e74588c9dea03a05a9fa22bdd207fab8fac15ef0af774f652f2f

    SHA512

    d8c2b474d5e5adbced808bd46737e7bc0357ef87003af189c4efecb6c3aad09ff35546b556d737e2d321b8f6cc907479809f6a1b7ec167a5296be0da6eaa77db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1336ce3ac371e3aada63a53d9fd501bc

    SHA1

    7a88d072647bb70f1c1804d4e1d36878d60e7df3

    SHA256

    169f4469713742b0f60312297f8fa8c7bf5b46e914b027f78abea587ad1cb7ff

    SHA512

    2677f844a5444dc41d84b20a92417e2e75d2c87d6311321657cb012d3c596b3eea2073ebdcce3a870b2cb30830f0107901262982f640d8408a9d75b81f561504

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    5e3bea9f2e5af315d778ff9db16a67ff

    SHA1

    f8a8119d9b8395f6ba4a30bee90f993ea1fdf0b2

    SHA256

    a91ba9cbbd647641b25a984208b461bbd01876063b8eef7d7f00de57c8c88fb1

    SHA512

    57773412c735e1aa19eb19789437c6feffd0aa3f4f92dfe1601a7c15d770d74a542dc8af20275a552998c0e734869e8ef7c63a9a83a1f5575f184c38c11a926e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    69f8200090c09af6898949baa12795da

    SHA1

    03f2a1f87179200f47b658080ece3bc2e752158d

    SHA256

    f00c325ad9ede9cbcf181a976146fb9955357a97239be49f9037e19594135391

    SHA512

    41aadd5f220acea0c794294a75790cc7f0659d937b625e9670a2d05605451211b51c67f42bbc9f0681bebbab830a25967715ba918dea195278836c9f0bf379bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    74b3a5eb883cd49f6403f8a2aef75aab

    SHA1

    7925b4a1138a98b11be13a849579823fe7c4ddaf

    SHA256

    ffb6f7600ec11a3473bd958ee4ded1d9a382225c974630e7e2ef7f736fbe10d6

    SHA512

    7f336af19f4e7c7176a88b3ace901d77c2bbe81ea0568d8642cf0fb8a14b3bb55c8918221190dbf3eea6061092856452bc1569ab3f330e1266b7575587319fa6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    82a3259a39fa784a493e271404e6a762

    SHA1

    60a0dada47ab56dd164428b62b1689bce9195568

    SHA256

    db8f155b9496a28594cb3563071457a06f28bad1e15e69a50c096682ffa14ff0

    SHA512

    8aa43a9f8733e580eee6ee9bc200da47f0b25136671238ac70b7f407eb7a798be691ccbdeabadc6e97acac350a5d934792caa6462ccfa8d4dd00f12fd544d3b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2f9b7720a7482546a2ba0c2f4fba23fe

    SHA1

    4f8d44f5ce20bba3406b9e26a99baf4ffd345c5f

    SHA256

    f063efb9460ad3d42b01dc929ef767b7184f656cd6cd80907008511f53376808

    SHA512

    defc0f8f51a6d3e3ad15750c7cd1bcbe04df5dcbf2e36d09b2d31f16c1c507550456e2c4d7a7e15c20c3a38f8cb7f6418207f901ffeb7c04b2e76b7e72b7e1b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    78e61f3695961407661ed2bd70d943f0

    SHA1

    f1c28d174dc2d3e3baa307c1daec6be362a5c330

    SHA256

    0bf622c0b6968bba41d6ce47d468edd0938ce87958247c8c1980969c12ecce8f

    SHA512

    d4cf47a41c57122fd6c9d5c3bb7db23c76b4626275e831bd852bcc5135f11202efb605db20321736ee2f95d5d47c2c7baa4ee9e9ffa785ec5829e8ac9e18753d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    46d545078704c008c09ab23ce1170001

    SHA1

    e74b0a787d37550f89b9ea8c1ef1f2925eaf4a6d

    SHA256

    483de8f879cc265b4a41acfc4cd2da5aa03fb740c875a9423c96d86f126ee580

    SHA512

    7d9d4fc0c19bdb9fd174bc375a256bd327fae5fbe220f2958f3fd418674ba279ced9c4bdd06b8430c5a5683a524a21df3007936d0605a9eb42d3cc9a9d59a482

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    424a8ee3ee6112c80bbff719744b5569

    SHA1

    5de0f6a9af78cea631a0c3af02951cb5ba7957bb

    SHA256

    5afa67026f1509b394f64a723bd4ab31a1a8f4eec0a4edfbfc7fa4322aa7c30d

    SHA512

    fbe9b740e3a8899f701b00687539eab052b2db66e8cc41418bb9cb3dfc1ff4539e78aefa2216cdc1a1d7a003a8d1ced36a750756c4630175fb507bad4801eeaf

  • C:\Users\Admin\AppData\Local\Temp\Cab6700.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6713.tmp
    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Local\Temp\s17g1ob91sdv56h9.tmp
    Filesize

    3KB

    MD5

    95f62965058baacadb83c2da94ca47de

    SHA1

    b3115c8b56105e1eae02fda8b3536b3bf38436ca

    SHA256

    d76b2bde3f59d34dbf1bba5917bfd17470703801b17984ad90b6cebcf914deb9

    SHA512

    9fbd110938f1c0a97b1f2742c8233e28a7e2802477f9222d3e0db95c1959ed3a1183b57ca1c92f006e6dbdf3ab03297cba0c6e06e2e2778a6dfa1e4ac2d7cb77

  • memory/2184-86-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2184-93-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2308-18-0x0000000000400000-0x000000000041D000-memory.dmp
    Filesize

    116KB

  • memory/2308-17-0x0000000000400000-0x000000000041D000-memory.dmp
    Filesize

    116KB

  • memory/2308-3-0x0000000000400000-0x000000000041D000-memory.dmp
    Filesize

    116KB

  • memory/2308-5-0x0000000000400000-0x000000000041D000-memory.dmp
    Filesize

    116KB

  • memory/2308-7-0x0000000000400000-0x000000000041D000-memory.dmp
    Filesize

    116KB

  • memory/2308-9-0x0000000000400000-0x000000000041D000-memory.dmp
    Filesize

    116KB

  • memory/2308-11-0x0000000000400000-0x000000000041D000-memory.dmp
    Filesize

    116KB

  • memory/2308-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB

  • memory/2308-15-0x0000000000400000-0x000000000041D000-memory.dmp
    Filesize

    116KB

  • memory/2324-46-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2324-19-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2324-21-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2324-23-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2324-25-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2324-27-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2324-30-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2324-32-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2324-33-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB