Analysis

  • max time kernel
    76s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2024, 09:02

General

  • Target

    5026e7bb0d84267387b84deef31e89b7.exe

  • Size

    279KB

  • MD5

    5026e7bb0d84267387b84deef31e89b7

  • SHA1

    d745c0c3c5cdb7133db6f81822b8e12faa73fa32

  • SHA256

    e88572accc29a9ca79eef71c2e535396d86504b213442af558ee4294260522cd

  • SHA512

    627c21121c3d2cf99568a1fe16b9ad5024da1ff624c2df279ec5d527c5d85bd47a49841246e48a05e96525336d9f9910ec298199af3a9bf53fbb9056c2edd52a

  • SSDEEP

    6144:PPEbIteUll5FcDOGej/1JxOcM28gQw3IvCIm5hG7X0hLqOh:9ll5FsOdj/1mB1hOImvGb0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1248
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:1840
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1380
          • C:\Users\Admin\AppData\Local\Temp\5026e7bb0d84267387b84deef31e89b7.exe
            "C:\Users\Admin\AppData\Local\Temp\5026e7bb0d84267387b84deef31e89b7.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2956
        • C:\Windows\system32\Dwm.exe
          "C:\Windows\system32\Dwm.exe"
          1⤵
            PID:1332
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp186d6f27.bat"
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 112
              2⤵
              • Program crash
              PID:1460
          • C:\Windows\system32\conhost.exe
            \??\C:\Windows\system32\conhost.exe "-246779854-430687478-105279439815451496402076026045-445894129-1196410285993872946"
            1⤵
              PID:1660
            • C:\Users\Admin\AppData\Roaming\Inycd\zeyvo.exe
              "C:\Users\Admin\AppData\Roaming\Inycd\zeyvo.exe"
              1⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:1908

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • \Users\Admin\AppData\Roaming\Inycd\zeyvo.exe

              Filesize

              5KB

              MD5

              81ad708a9b8d5a22ee24969e71daf22b

              SHA1

              188b17da00e32784c024fad7650c9a05e97e05c2

              SHA256

              68d0bb197526e489d6a60547b09e8109e8797cc0a2076b72be1707fdde78132d

              SHA512

              b0d57ce070e9e630c475bb24abf2b2cae9e98d70c4981d5a2bc8d90582d53699e60b39af85d6c880d740c39cf5ac1dae7ebf25ee049f645f8bc5a41ca03f63f1

            • \Users\Admin\AppData\Roaming\Inycd\zeyvo.exe

              Filesize

              28KB

              MD5

              c3aad05518ef8f1bcdf0ca384170eeeb

              SHA1

              03f670cb99e27ff738e31b157de2ac527d189f43

              SHA256

              808dab3b248645bde938947ed3cd9bc65dbb8b21e458966116104efd82eedee9

              SHA512

              73a5cba8f57b7c867904edb3426ce77d3f0306fa282c0b5dd25e9b051be34d5a4289fcc6c8e16374af53b1234a49e4553948c7f454570cd4c3b67912ccbf4ec0

            • memory/1248-23-0x00000000000F0000-0x0000000000131000-memory.dmp

              Filesize

              260KB

            • memory/1248-18-0x00000000000F0000-0x0000000000131000-memory.dmp

              Filesize

              260KB

            • memory/1248-22-0x00000000000F0000-0x0000000000131000-memory.dmp

              Filesize

              260KB

            • memory/1248-21-0x00000000000F0000-0x0000000000131000-memory.dmp

              Filesize

              260KB

            • memory/1248-19-0x00000000000F0000-0x0000000000131000-memory.dmp

              Filesize

              260KB

            • memory/1332-32-0x00000000021C0000-0x0000000002201000-memory.dmp

              Filesize

              260KB

            • memory/1332-26-0x00000000021C0000-0x0000000002201000-memory.dmp

              Filesize

              260KB

            • memory/1332-30-0x00000000021C0000-0x0000000002201000-memory.dmp

              Filesize

              260KB

            • memory/1332-28-0x00000000021C0000-0x0000000002201000-memory.dmp

              Filesize

              260KB

            • memory/1380-37-0x0000000002470000-0x00000000024B1000-memory.dmp

              Filesize

              260KB

            • memory/1380-35-0x0000000002470000-0x00000000024B1000-memory.dmp

              Filesize

              260KB

            • memory/1380-36-0x0000000002470000-0x00000000024B1000-memory.dmp

              Filesize

              260KB

            • memory/1380-38-0x0000000002470000-0x00000000024B1000-memory.dmp

              Filesize

              260KB

            • memory/1460-284-0x0000000002680000-0x00000000026C1000-memory.dmp

              Filesize

              260KB

            • memory/1460-182-0x0000000002680000-0x00000000026C1000-memory.dmp

              Filesize

              260KB

            • memory/1460-185-0x00000000777A0000-0x00000000777A1000-memory.dmp

              Filesize

              4KB

            • memory/1460-279-0x0000000001D90000-0x0000000001D91000-memory.dmp

              Filesize

              4KB

            • memory/1460-187-0x00000000777A0000-0x00000000777A1000-memory.dmp

              Filesize

              4KB

            • memory/1840-41-0x0000000000380000-0x00000000003C1000-memory.dmp

              Filesize

              260KB

            • memory/1840-43-0x0000000000380000-0x00000000003C1000-memory.dmp

              Filesize

              260KB

            • memory/1840-40-0x0000000000380000-0x00000000003C1000-memory.dmp

              Filesize

              260KB

            • memory/1840-42-0x0000000000380000-0x00000000003C1000-memory.dmp

              Filesize

              260KB

            • memory/1908-17-0x0000000000450000-0x0000000000498000-memory.dmp

              Filesize

              288KB

            • memory/1908-20-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1908-15-0x0000000000270000-0x00000000002B1000-memory.dmp

              Filesize

              260KB

            • memory/1908-282-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2956-71-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/2956-9-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2956-55-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/2956-57-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/2956-59-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/2956-61-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/2956-63-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/2956-65-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/2956-67-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/2956-69-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/2956-52-0x0000000000490000-0x00000000004D1000-memory.dmp

              Filesize

              260KB

            • memory/2956-46-0x0000000000490000-0x00000000004D1000-memory.dmp

              Filesize

              260KB

            • memory/2956-2-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2956-54-0x0000000000490000-0x00000000004D1000-memory.dmp

              Filesize

              260KB

            • memory/2956-73-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/2956-75-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/2956-170-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2956-4-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2956-3-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2956-1-0x0000000000350000-0x0000000000398000-memory.dmp

              Filesize

              288KB

            • memory/2956-0-0x0000000000300000-0x0000000000341000-memory.dmp

              Filesize

              260KB

            • memory/2956-77-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/2956-88-0x00000000777A0000-0x00000000777A1000-memory.dmp

              Filesize

              4KB

            • memory/2956-147-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/2956-79-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/2956-50-0x0000000000490000-0x00000000004D1000-memory.dmp

              Filesize

              260KB

            • memory/2956-48-0x0000000000490000-0x00000000004D1000-memory.dmp

              Filesize

              260KB