Analysis
-
max time kernel
148s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
518c295dd4bc20e300c2bf5fe3bd540a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
518c295dd4bc20e300c2bf5fe3bd540a.exe
Resource
win10v2004-20231222-en
General
-
Target
518c295dd4bc20e300c2bf5fe3bd540a.exe
-
Size
262KB
-
MD5
518c295dd4bc20e300c2bf5fe3bd540a
-
SHA1
845c6ddc19e0dad406a3cd96cb416080d196989d
-
SHA256
aff31cff567948ba4ae2144bbcc562a4d3ab115f7e8b00482414b81ebf40a543
-
SHA512
02ca9a41141c31a205c2f3ea4782d3135910aaa7434dd87a3d8b4866b889873aa00fe5449fea782641a74fd5edc9433303b9e4c7b8f49b0f4997ede7a41f9217
-
SSDEEP
6144:758Gp+df0afmVTRMdwdpn94sLrNXel9ibb98+MAAD:F8YkfXf4TRME94svNuzibb9Z+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2364 wiah.exe -
Loads dropped DLL 1 IoCs
pid Process 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F08D48C8-DA76-AD4E-F540-ECC2E1DBCFDF} = "C:\\Users\\Admin\\AppData\\Roaming\\Otkyi\\wiah.exe" wiah.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2168 set thread context of 2164 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe 16 -
Program crash 1 IoCs
pid pid_target Process procid_target 1676 2164 WerFault.exe 16 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy 518c295dd4bc20e300c2bf5fe3bd540a.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 518c295dd4bc20e300c2bf5fe3bd540a.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe 2364 wiah.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe Token: SeSecurityPrivilege 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe Token: SeSecurityPrivilege 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe 2364 wiah.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2364 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe 19 PID 2168 wrote to memory of 2364 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe 19 PID 2168 wrote to memory of 2364 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe 19 PID 2168 wrote to memory of 2364 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe 19 PID 2364 wrote to memory of 1120 2364 wiah.exe 9 PID 2364 wrote to memory of 1120 2364 wiah.exe 9 PID 2364 wrote to memory of 1120 2364 wiah.exe 9 PID 2364 wrote to memory of 1120 2364 wiah.exe 9 PID 2364 wrote to memory of 1120 2364 wiah.exe 9 PID 2364 wrote to memory of 1224 2364 wiah.exe 8 PID 2364 wrote to memory of 1224 2364 wiah.exe 8 PID 2364 wrote to memory of 1224 2364 wiah.exe 8 PID 2364 wrote to memory of 1224 2364 wiah.exe 8 PID 2364 wrote to memory of 1224 2364 wiah.exe 8 PID 2364 wrote to memory of 1256 2364 wiah.exe 7 PID 2364 wrote to memory of 1256 2364 wiah.exe 7 PID 2364 wrote to memory of 1256 2364 wiah.exe 7 PID 2364 wrote to memory of 1256 2364 wiah.exe 7 PID 2364 wrote to memory of 1256 2364 wiah.exe 7 PID 2364 wrote to memory of 1652 2364 wiah.exe 5 PID 2364 wrote to memory of 1652 2364 wiah.exe 5 PID 2364 wrote to memory of 1652 2364 wiah.exe 5 PID 2364 wrote to memory of 1652 2364 wiah.exe 5 PID 2364 wrote to memory of 1652 2364 wiah.exe 5 PID 2364 wrote to memory of 2168 2364 wiah.exe 1 PID 2364 wrote to memory of 2168 2364 wiah.exe 1 PID 2364 wrote to memory of 2168 2364 wiah.exe 1 PID 2364 wrote to memory of 2168 2364 wiah.exe 1 PID 2364 wrote to memory of 2168 2364 wiah.exe 1 PID 2168 wrote to memory of 2164 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe 16 PID 2168 wrote to memory of 2164 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe 16 PID 2168 wrote to memory of 2164 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe 16 PID 2168 wrote to memory of 2164 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe 16 PID 2168 wrote to memory of 2164 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe 16 PID 2168 wrote to memory of 2164 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe 16 PID 2168 wrote to memory of 2164 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe 16 PID 2168 wrote to memory of 2164 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe 16 PID 2168 wrote to memory of 2164 2168 518c295dd4bc20e300c2bf5fe3bd540a.exe 16 PID 2164 wrote to memory of 1676 2164 cmd.exe 17 PID 2164 wrote to memory of 1676 2164 cmd.exe 17 PID 2164 wrote to memory of 1676 2164 cmd.exe 17 PID 2164 wrote to memory of 1676 2164 cmd.exe 17 PID 2364 wrote to memory of 1628 2364 wiah.exe 18 PID 2364 wrote to memory of 1628 2364 wiah.exe 18 PID 2364 wrote to memory of 1628 2364 wiah.exe 18 PID 2364 wrote to memory of 1628 2364 wiah.exe 18 PID 2364 wrote to memory of 1628 2364 wiah.exe 18 PID 2364 wrote to memory of 1676 2364 wiah.exe 17 PID 2364 wrote to memory of 1676 2364 wiah.exe 17 PID 2364 wrote to memory of 1676 2364 wiah.exe 17 PID 2364 wrote to memory of 1676 2364 wiah.exe 17 PID 2364 wrote to memory of 1676 2364 wiah.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\518c295dd4bc20e300c2bf5fe3bd540a.exe"C:\Users\Admin\AppData\Local\Temp\518c295dd4bc20e300c2bf5fe3bd540a.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp9d45a64d.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 1123⤵
- Program crash
PID:1676
-
-
-
C:\Users\Admin\AppData\Roaming\Otkyi\wiah.exe"C:\Users\Admin\AppData\Roaming\Otkyi\wiah.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2364
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1652
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1224
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2016524993106840588312773213151382091468-1684313077-1872060101-738079523787781196"1⤵PID:1628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD57b81fdf4ef7428b559608171b011dace
SHA1ea43f84e5f27ba3be45ecf4182e4b6962ae24a02
SHA256179d546fc1dd6c6db353ea56e2c225cef939602ef0586ac4c0b037aa19ad5fc1
SHA512b92e0beadcb45dc68620e3b28e51370e43584d8c3ab61a42ddb3c3d40c131f6a1416a76d60d2fa4e825e72b3837cbccf2591afa704c8a0110058f7938549f65f
-
Filesize
262KB
MD53a0cdf7d687cfd7b0ee3a4470870b716
SHA19a3653af4fcf6d6ccb5037c47cd79e860cb065c0
SHA256e1f0ca78949d4b3c388fcd6988a04299a7dbf57f0101cd0fd63bfc588d19d3bb
SHA5122e5e80c2d8df3bb9667dfe4c1c179651fd8d96cf6085cbbd0a2f1ccce4952db538ad044050a11b6486b38c70f508a60f5d0169549808928b9b3b5c143420e563
-
Filesize
366B
MD5d34fc2d78b662906697cc10b6d341d7b
SHA1d7022005f1eab423bb0d50be8a9b2f62c381cdb4
SHA256702b79e7bd7a6382c5251b3b6abce9e504d2a30680542b44e98a2ef338a15ece
SHA51296b8939bf864d4d76a0941d7f391b56be2299957564d6ebc23894dfef71385b5071e857ffc09e46613769ba017c0dc10a3f21f673384b58c48ea2a10249bc6af
-
Filesize
175KB
MD5eed379f3a06ed397a13cda7469e85178
SHA17778c050aa38b0e758f22d457bcae4f938192360
SHA25649d6dc637fd7cc4b33c0e79732bcb9a39500974a1c14529899c05bda76209652
SHA512d40f7fe92ee7a6593985d6637ec042f40383e89f204dfb299b427de6a007fb24fd2048b06c8ee2771a1bd87a9b9687bc63a7e62025f8f6b52b92af8630dcb27e