Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 16:30
Behavioral task
behavioral1
Sample
5404e0eecb833b541bb8c2cb93f677ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5404e0eecb833b541bb8c2cb93f677ff.exe
Resource
win10v2004-20231222-en
General
-
Target
5404e0eecb833b541bb8c2cb93f677ff.exe
-
Size
234KB
-
MD5
5404e0eecb833b541bb8c2cb93f677ff
-
SHA1
c590c06a8e755346d3986b921b287c292733e2be
-
SHA256
933d779247ea0959850d1c7109bc90681dd8fa1ed5f58fdba03b9c6e2f32cfff
-
SHA512
ba82b9691c99a060d827fe48026f64771c880545b5164f0657817935e0fdbac86fb82e8a36b7a77a009d436571a2cb41a6977c15297be77352db672401e6177a
-
SSDEEP
6144:+vdd1DkofdVGzU0bKJgkycch60n9z3xiBR5lVIeqvoSS:+v1zdYcgktcdBiBRpFqvoSS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2160 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 yzci.exe -
Loads dropped DLL 2 IoCs
pid Process 1676 5404e0eecb833b541bb8c2cb93f677ff.exe 1676 5404e0eecb833b541bb8c2cb93f677ff.exe -
resource yara_rule behavioral1/memory/1676-0-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/files/0x000d000000012323-11.dat upx behavioral1/memory/1676-13-0x0000000000360000-0x00000000003C6000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D315C75A-7061-C6CA-A1FE-023088B271DB} = "C:\\Users\\Admin\\AppData\\Roaming\\Apitha\\yzci.exe" yzci.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1676 set thread context of 2160 1676 5404e0eecb833b541bb8c2cb93f677ff.exe 30 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 5404e0eecb833b541bb8c2cb93f677ff.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Privacy 5404e0eecb833b541bb8c2cb93f677ff.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\54214AFD-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe 2712 yzci.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1676 5404e0eecb833b541bb8c2cb93f677ff.exe Token: SeSecurityPrivilege 1676 5404e0eecb833b541bb8c2cb93f677ff.exe Token: SeSecurityPrivilege 1676 5404e0eecb833b541bb8c2cb93f677ff.exe Token: SeManageVolumePrivilege 1076 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1076 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1076 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1076 WinMail.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2712 1676 5404e0eecb833b541bb8c2cb93f677ff.exe 28 PID 1676 wrote to memory of 2712 1676 5404e0eecb833b541bb8c2cb93f677ff.exe 28 PID 1676 wrote to memory of 2712 1676 5404e0eecb833b541bb8c2cb93f677ff.exe 28 PID 1676 wrote to memory of 2712 1676 5404e0eecb833b541bb8c2cb93f677ff.exe 28 PID 2712 wrote to memory of 1088 2712 yzci.exe 19 PID 2712 wrote to memory of 1088 2712 yzci.exe 19 PID 2712 wrote to memory of 1088 2712 yzci.exe 19 PID 2712 wrote to memory of 1088 2712 yzci.exe 19 PID 2712 wrote to memory of 1088 2712 yzci.exe 19 PID 2712 wrote to memory of 1172 2712 yzci.exe 17 PID 2712 wrote to memory of 1172 2712 yzci.exe 17 PID 2712 wrote to memory of 1172 2712 yzci.exe 17 PID 2712 wrote to memory of 1172 2712 yzci.exe 17 PID 2712 wrote to memory of 1172 2712 yzci.exe 17 PID 2712 wrote to memory of 1200 2712 yzci.exe 11 PID 2712 wrote to memory of 1200 2712 yzci.exe 11 PID 2712 wrote to memory of 1200 2712 yzci.exe 11 PID 2712 wrote to memory of 1200 2712 yzci.exe 11 PID 2712 wrote to memory of 1200 2712 yzci.exe 11 PID 2712 wrote to memory of 772 2712 yzci.exe 15 PID 2712 wrote to memory of 772 2712 yzci.exe 15 PID 2712 wrote to memory of 772 2712 yzci.exe 15 PID 2712 wrote to memory of 772 2712 yzci.exe 15 PID 2712 wrote to memory of 772 2712 yzci.exe 15 PID 2712 wrote to memory of 1676 2712 yzci.exe 27 PID 2712 wrote to memory of 1676 2712 yzci.exe 27 PID 2712 wrote to memory of 1676 2712 yzci.exe 27 PID 2712 wrote to memory of 1676 2712 yzci.exe 27 PID 2712 wrote to memory of 1676 2712 yzci.exe 27 PID 1676 wrote to memory of 2160 1676 5404e0eecb833b541bb8c2cb93f677ff.exe 30 PID 1676 wrote to memory of 2160 1676 5404e0eecb833b541bb8c2cb93f677ff.exe 30 PID 1676 wrote to memory of 2160 1676 5404e0eecb833b541bb8c2cb93f677ff.exe 30 PID 1676 wrote to memory of 2160 1676 5404e0eecb833b541bb8c2cb93f677ff.exe 30 PID 1676 wrote to memory of 2160 1676 5404e0eecb833b541bb8c2cb93f677ff.exe 30 PID 1676 wrote to memory of 2160 1676 5404e0eecb833b541bb8c2cb93f677ff.exe 30 PID 1676 wrote to memory of 2160 1676 5404e0eecb833b541bb8c2cb93f677ff.exe 30 PID 1676 wrote to memory of 2160 1676 5404e0eecb833b541bb8c2cb93f677ff.exe 30 PID 1676 wrote to memory of 2160 1676 5404e0eecb833b541bb8c2cb93f677ff.exe 30 PID 2712 wrote to memory of 2960 2712 yzci.exe 31 PID 2712 wrote to memory of 2960 2712 yzci.exe 31 PID 2712 wrote to memory of 2960 2712 yzci.exe 31 PID 2712 wrote to memory of 2960 2712 yzci.exe 31 PID 2712 wrote to memory of 2960 2712 yzci.exe 31 PID 2712 wrote to memory of 2064 2712 yzci.exe 33 PID 2712 wrote to memory of 2064 2712 yzci.exe 33 PID 2712 wrote to memory of 2064 2712 yzci.exe 33 PID 2712 wrote to memory of 2064 2712 yzci.exe 33 PID 2712 wrote to memory of 2064 2712 yzci.exe 33 PID 2712 wrote to memory of 1164 2712 yzci.exe 34 PID 2712 wrote to memory of 1164 2712 yzci.exe 34 PID 2712 wrote to memory of 1164 2712 yzci.exe 34 PID 2712 wrote to memory of 1164 2712 yzci.exe 34 PID 2712 wrote to memory of 1164 2712 yzci.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\5404e0eecb833b541bb8c2cb93f677ff.exe"C:\Users\Admin\AppData\Local\Temp\5404e0eecb833b541bb8c2cb93f677ff.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Roaming\Apitha\yzci.exe"C:\Users\Admin\AppData\Roaming\Apitha\yzci.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpfc254736.bat"3⤵
- Deletes itself
PID:2160
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:772
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1088
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1076
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2960
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2064
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD540594d2b73227e2bf7c0fd4c56b9eb7f
SHA1f8a6f4678b16b820bd34d5f3408ae3d044955610
SHA2567209da40dcd843ddb906fdf485b6d956f4c16b8d6a03c0255559cd8a7f948ad4
SHA51204f21cf99bcee274727cc744a9da7bcccc6cc7e476a4cb60436b34b146cd4fd20b75f234a1d9375cdbb95f6c977933662d830d2351b6cc943b7653a037f62025
-
Filesize
243B
MD56c1e5a5266ee9f5961185ba1c14f4974
SHA1b136fe584503f885ef19f4ca68aa6df2aa7625e9
SHA256e3c48847701689068d54940c2bc0a032a49c18f5c1d3afd2eee720c3671f33c8
SHA512f33017602b02d1f8fb7b32cf04759bd7837b8eebf549a7f92d729774eb51b76fa8d457a11cb733048a6c8992bfc261c4a81c78955b086d1f83819c423bd26b90
-
Filesize
388B
MD5820a0f476cd07ea2a2fa86f239d460eb
SHA1b244ec7a8a2619a6cd9e753bc04ee79d7809ee6d
SHA25677e6221e94cb921c312647ed59dfc28bb3e477c41225e5a63c52fd7eee946d9d
SHA51298669557f941a91330552e747c53b7817d3433da3487f2d51a94bab26d8e2fab1cc09ef29930650db873feeb5e4ec378dcb0cde76bc3980c2f62ca77793eac33
-
Filesize
234KB
MD5cefbceecb5f1a8fc944c10be6631a7ad
SHA1eab4b29a752e556f4b0fbb7d50449eccf1467a9a
SHA2567b29f3de84802c6dc7336f19294b09a605280d70e35ffa8051760e2020ed7fd6
SHA51251e0325391bb3284f3a0e6bd3c4f1916001f4b3ede37135e3d9b47bacd110db131a8a0b5b95efee28bf61f0bf419137ce7c022979231f7606d938c9334f38d21