Analysis
-
max time kernel
76s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
5026e7bb0d84267387b84deef31e89b7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5026e7bb0d84267387b84deef31e89b7.exe
Resource
win10v2004-20231222-en
General
-
Target
5026e7bb0d84267387b84deef31e89b7.exe
-
Size
279KB
-
MD5
5026e7bb0d84267387b84deef31e89b7
-
SHA1
d745c0c3c5cdb7133db6f81822b8e12faa73fa32
-
SHA256
e88572accc29a9ca79eef71c2e535396d86504b213442af558ee4294260522cd
-
SHA512
627c21121c3d2cf99568a1fe16b9ad5024da1ff624c2df279ec5d527c5d85bd47a49841246e48a05e96525336d9f9910ec298199af3a9bf53fbb9056c2edd52a
-
SSDEEP
6144:PPEbIteUll5FcDOGej/1JxOcM28gQw3IvCIm5hG7X0hLqOh:9ll5FsOdj/1mB1hOImvGb0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1908 zeyvo.exe -
Loads dropped DLL 2 IoCs
pid Process 2956 5026e7bb0d84267387b84deef31e89b7.exe 2956 5026e7bb0d84267387b84deef31e89b7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F08D48C8-DA76-AD4E-F540-ECC2E1DBCFDF} = "C:\\Users\\Admin\\AppData\\Roaming\\Inycd\\zeyvo.exe" zeyvo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2956 set thread context of 2804 2956 5026e7bb0d84267387b84deef31e89b7.exe 16 -
Program crash 1 IoCs
pid pid_target Process procid_target 1460 2804 WerFault.exe 16 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy 5026e7bb0d84267387b84deef31e89b7.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 5026e7bb0d84267387b84deef31e89b7.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe 1908 zeyvo.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2956 5026e7bb0d84267387b84deef31e89b7.exe Token: SeSecurityPrivilege 2956 5026e7bb0d84267387b84deef31e89b7.exe Token: SeSecurityPrivilege 2956 5026e7bb0d84267387b84deef31e89b7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2956 5026e7bb0d84267387b84deef31e89b7.exe 1908 zeyvo.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2956 wrote to memory of 1908 2956 5026e7bb0d84267387b84deef31e89b7.exe 19 PID 2956 wrote to memory of 1908 2956 5026e7bb0d84267387b84deef31e89b7.exe 19 PID 2956 wrote to memory of 1908 2956 5026e7bb0d84267387b84deef31e89b7.exe 19 PID 2956 wrote to memory of 1908 2956 5026e7bb0d84267387b84deef31e89b7.exe 19 PID 1908 wrote to memory of 1248 1908 zeyvo.exe 5 PID 1908 wrote to memory of 1248 1908 zeyvo.exe 5 PID 1908 wrote to memory of 1248 1908 zeyvo.exe 5 PID 1908 wrote to memory of 1248 1908 zeyvo.exe 5 PID 1908 wrote to memory of 1248 1908 zeyvo.exe 5 PID 1908 wrote to memory of 1332 1908 zeyvo.exe 12 PID 1908 wrote to memory of 1332 1908 zeyvo.exe 12 PID 1908 wrote to memory of 1332 1908 zeyvo.exe 12 PID 1908 wrote to memory of 1332 1908 zeyvo.exe 12 PID 1908 wrote to memory of 1332 1908 zeyvo.exe 12 PID 1908 wrote to memory of 1380 1908 zeyvo.exe 11 PID 1908 wrote to memory of 1380 1908 zeyvo.exe 11 PID 1908 wrote to memory of 1380 1908 zeyvo.exe 11 PID 1908 wrote to memory of 1380 1908 zeyvo.exe 11 PID 1908 wrote to memory of 1380 1908 zeyvo.exe 11 PID 1908 wrote to memory of 1840 1908 zeyvo.exe 9 PID 1908 wrote to memory of 1840 1908 zeyvo.exe 9 PID 1908 wrote to memory of 1840 1908 zeyvo.exe 9 PID 1908 wrote to memory of 1840 1908 zeyvo.exe 9 PID 1908 wrote to memory of 1840 1908 zeyvo.exe 9 PID 1908 wrote to memory of 2956 1908 zeyvo.exe 20 PID 1908 wrote to memory of 2956 1908 zeyvo.exe 20 PID 1908 wrote to memory of 2956 1908 zeyvo.exe 20 PID 1908 wrote to memory of 2956 1908 zeyvo.exe 20 PID 1908 wrote to memory of 2956 1908 zeyvo.exe 20 PID 2956 wrote to memory of 2804 2956 5026e7bb0d84267387b84deef31e89b7.exe 16 PID 2956 wrote to memory of 2804 2956 5026e7bb0d84267387b84deef31e89b7.exe 16 PID 2956 wrote to memory of 2804 2956 5026e7bb0d84267387b84deef31e89b7.exe 16 PID 2956 wrote to memory of 2804 2956 5026e7bb0d84267387b84deef31e89b7.exe 16 PID 2956 wrote to memory of 2804 2956 5026e7bb0d84267387b84deef31e89b7.exe 16 PID 2956 wrote to memory of 2804 2956 5026e7bb0d84267387b84deef31e89b7.exe 16 PID 2956 wrote to memory of 2804 2956 5026e7bb0d84267387b84deef31e89b7.exe 16 PID 2956 wrote to memory of 2804 2956 5026e7bb0d84267387b84deef31e89b7.exe 16 PID 2956 wrote to memory of 2804 2956 5026e7bb0d84267387b84deef31e89b7.exe 16 PID 2804 wrote to memory of 1460 2804 cmd.exe 17 PID 2804 wrote to memory of 1460 2804 cmd.exe 17 PID 2804 wrote to memory of 1460 2804 cmd.exe 17 PID 2804 wrote to memory of 1460 2804 cmd.exe 17 PID 1908 wrote to memory of 1660 1908 zeyvo.exe 18 PID 1908 wrote to memory of 1660 1908 zeyvo.exe 18 PID 1908 wrote to memory of 1660 1908 zeyvo.exe 18 PID 1908 wrote to memory of 1660 1908 zeyvo.exe 18 PID 1908 wrote to memory of 1660 1908 zeyvo.exe 18 PID 1908 wrote to memory of 1460 1908 zeyvo.exe 17 PID 1908 wrote to memory of 1460 1908 zeyvo.exe 17 PID 1908 wrote to memory of 1460 1908 zeyvo.exe 17 PID 1908 wrote to memory of 1460 1908 zeyvo.exe 17 PID 1908 wrote to memory of 1460 1908 zeyvo.exe 17
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1248
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1840
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\5026e7bb0d84267387b84deef31e89b7.exe"C:\Users\Admin\AppData\Local\Temp\5026e7bb0d84267387b84deef31e89b7.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2956
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1332
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp186d6f27.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 1122⤵
- Program crash
PID:1460
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-246779854-430687478-105279439815451496402076026045-445894129-1196410285993872946"1⤵PID:1660
-
C:\Users\Admin\AppData\Roaming\Inycd\zeyvo.exe"C:\Users\Admin\AppData\Roaming\Inycd\zeyvo.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD581ad708a9b8d5a22ee24969e71daf22b
SHA1188b17da00e32784c024fad7650c9a05e97e05c2
SHA25668d0bb197526e489d6a60547b09e8109e8797cc0a2076b72be1707fdde78132d
SHA512b0d57ce070e9e630c475bb24abf2b2cae9e98d70c4981d5a2bc8d90582d53699e60b39af85d6c880d740c39cf5ac1dae7ebf25ee049f645f8bc5a41ca03f63f1
-
Filesize
28KB
MD5c3aad05518ef8f1bcdf0ca384170eeeb
SHA103f670cb99e27ff738e31b157de2ac527d189f43
SHA256808dab3b248645bde938947ed3cd9bc65dbb8b21e458966116104efd82eedee9
SHA51273a5cba8f57b7c867904edb3426ce77d3f0306fa282c0b5dd25e9b051be34d5a4289fcc6c8e16374af53b1234a49e4553948c7f454570cd4c3b67912ccbf4ec0