Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14/01/2024, 00:00

General

  • Target

    59c023b5e9b7c64112ee8f67e075d920.exe

  • Size

    193KB

  • MD5

    59c023b5e9b7c64112ee8f67e075d920

  • SHA1

    8c2b77e393014cd8af45c2ed0be324833f143106

  • SHA256

    50ab75e395039e2fe9aa39430798ed788a1572deb73b2d65e5a135838b49d455

  • SHA512

    63f413aba226e6248861580723b4009a0e8d41d6db83f0008c3a5a74f2b1bcb93dfe72c83472b9d1351316e5aa6180a60b2ab98f0d568f5469e159dc96c35926

  • SSDEEP

    3072:agjERgXA5/Wg4KmbjQ/JaPrTsitEnyP4HU+BIhaeu/hht/RFb9S6Lb1N:aFgIug1mbjQ/w4r50OemDtrjJN

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1120
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1172
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1200
          • C:\Users\Admin\AppData\Local\Temp\59c023b5e9b7c64112ee8f67e075d920.exe
            "C:\Users\Admin\AppData\Local\Temp\59c023b5e9b7c64112ee8f67e075d920.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1220
            • C:\Users\Admin\AppData\Roaming\Yzbyp\niex.exe
              "C:\Users\Admin\AppData\Roaming\Yzbyp\niex.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2756
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpdd609986.bat"
              3⤵
              • Deletes itself
              • Suspicious use of AdjustPrivilegeToken
              PID:2440
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1216
          • C:\Program Files\Windows Mail\WinMail.exe
            "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
            1⤵
            • NTFS ADS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            PID:2892
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:636
            • C:\Program Files\Windows Mail\WinMail.exe
              "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:2996
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:2664
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:2388

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E6024EAC88E6B6165D49FE3C95ADD735

                  Filesize

                  558B

                  MD5

                  3cc0012f96f8f44164c18d7de05023d9

                  SHA1

                  c8feb560d751fe720c8bdb53f5e78aa92abb9a9e

                  SHA256

                  2654c273c211ae1afc60a7736153a853142e3db028417206948576d1d57bf5d5

                  SHA512

                  626746176663e2460b18f1eb245306107060c172c4e65ad710dd75ec0b348d8f000342c0dd2f7ea3bb2e0796f61e1ddd2cd77c312d6a177ff2e70a10b68cc6af

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                  Filesize

                  344B

                  MD5

                  90dcdf01716f4fe633b9694b48753118

                  SHA1

                  38a05f129316a9e5fcf5db064418b262b3ba0849

                  SHA256

                  de209e9a2cb479887b2ce77f03c305d0cda131db63394e4a2a39b160dfc81147

                  SHA512

                  5d538b3b9d47e3203fd4c2de7c7053b07bc4aebbe45dbdfaa72c91afe99d6b206e37e24bdb9eae0cd9faea699f340d70bedc5c9893c23501e2f756dac0ff99e9

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735

                  Filesize

                  232B

                  MD5

                  633808f9ea009b91fceda050828deed5

                  SHA1

                  e0a9e61fd8e29e2d72df6bc411c910b3cdd1548f

                  SHA256

                  d421cfd20b0f030f36ba6d64f4b267878b18d96c721dd6c8037455fc14b5aa26

                  SHA512

                  3c1b526059f0d6224705d558b1447504c6d90be152018c12e3e232f5eb3dca3527a1e8ded220fd2cb792ee7ec58221e9e02aa25c8608413b16c735c6b634ee6d

                • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\WindowsMail.MSMessageStore

                  Filesize

                  2.0MB

                  MD5

                  a137d94335d44f121a15f78c1a12e9fe

                  SHA1

                  392a5ec3df08b0488e716167f1e430a15b04fa81

                  SHA256

                  6d9e4226917416b6d3d1007b1c4755f12efbb0993845a75138728a0ce1ab66e7

                  SHA512

                  fb6231b8eb2b1ed3b336271d77e2766ba57edb759ff500016e47bf98315547a6a9c98e794b093d3f828f0482f4381c41a76b263eaeb315e36dd66752b0390390

                • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.chk

                  Filesize

                  8KB

                  MD5

                  83c382ef8c69dca7f506eee871b3f3d2

                  SHA1

                  ff6b1bb8632e0d484a59f50f7f8d15dd25dfe056

                  SHA256

                  0e38cf9e110212eff24979c08d392db9f713f6e1c3c88b135973cabe56e32202

                  SHA512

                  1aa89dfdac8ea2a84b5a9a78ad0d8ae82d3378d2ac611b82915454d596c67e8ad5c68e9532748e02dc5ba5ae50cf3564cfc2070790e5564800bfce44276e3ad3

                • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                  Filesize

                  2.0MB

                  MD5

                  0158a3c08377aba75db0b2f9705b55c0

                  SHA1

                  6812ff07a47a5fdd8c0b5c0c0d34a330a54f7a84

                  SHA256

                  63fdb62366d267820689c9eb341357ddbfad50fb0fb2c0ffbf73fab150ef226b

                  SHA512

                  e6bcb3ca18ebb7ae515a8424ff1dfcf381ae97fb9f79bc4c0001f43e2942c813a4f03eb1bca86e0803c710bc307a0eaf7c093f350e14ce10e6f2fb90f3097234

                • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                  Filesize

                  2.0MB

                  MD5

                  90806f7aec38dbc0a7aeb5b445effc24

                  SHA1

                  970c31f4576b08dcbad5e11e88e8b17da633617e

                  SHA256

                  0213847b52a2b325a3fff7b99c1f913d1bc53672750bc05fb8d042b0eeb48336

                  SHA512

                  a07fee241d8714350492349eab9910cbda7d3601e496dfe173ab8dd7676b907de59c60faecc2bdd0c0c65e45cb3b744dde20ccbf830d02b896968d7314b092aa

                • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                  Filesize

                  2.0MB

                  MD5

                  c98ae98efcbd17cbace30f21cc3a083b

                  SHA1

                  a183833d39a303356b56ef128337faff861e0fd2

                  SHA256

                  ab242020a3b6584a6b5f243bf0baf66fc059d386325c9dbe38d6c9a933ff0f4d

                  SHA512

                  70ae20e61219bc6c2bcd4766a3a3568f53f3cceccd3b1eecccda412f9a69103e4e8faea406d7275661d1e06e0752405f9438f1e7b82e591e99c959a90295d9d8

                • C:\Users\Admin\AppData\Local\Temp\Cab8E4B.tmp

                  Filesize

                  65KB

                  MD5

                  ac05d27423a85adc1622c714f2cb6184

                  SHA1

                  b0fe2b1abddb97837ea0195be70ab2ff14d43198

                  SHA256

                  c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                  SHA512

                  6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                • C:\Users\Admin\AppData\Local\Temp\tmpdd609986.bat

                  Filesize

                  243B

                  MD5

                  f323e3e2b4a38b48bf5433884753f205

                  SHA1

                  20828419e7c0a7755ea7b80e6c16d3d243e90936

                  SHA256

                  7c61def286b46705c578409b26c7ce23c75b6fa49f41dc705b84086d541aa21b

                  SHA512

                  c99a5cf22102b08b91b652c9f179e3805b915a48bf7db09d431a5a4bd9ce5fe682dbf822dd1e96f50ec0a313dfd32b0fcad2ff40cfe9d9cb74488387a2227594

                • C:\Users\Admin\AppData\Roaming\Enqau\zuacf.hoh

                  Filesize

                  366B

                  MD5

                  b4c4640974d235d454e6e3e1e2cee2c7

                  SHA1

                  0012ef4e42b4cf245b366d99ab21e428eb367081

                  SHA256

                  7b143e8d2f87a75c1f2bfb6321af80ee2261b16af00f68a0e1e762399b585af0

                  SHA512

                  a30d37968d821b2e606a4318fad8c813bf367def687def86374bec2259af98e425f23830abb428dd9fb52f96e41884e671843f8752cf15d0bc40f50a08afd453

                • \Users\Admin\AppData\Roaming\Yzbyp\niex.exe

                  Filesize

                  193KB

                  MD5

                  2a6665e7a113e10e4d6c07b880b02d54

                  SHA1

                  102da5a569d8501be9116723a225c5cd2387066e

                  SHA256

                  89c56474d8d7e17983be5590a3d3c4e56a1e998da5140912dc491c639a729675

                  SHA512

                  973bcd96029d5940fd8bb11229f0e9ff529605c425fd131c4c8ac853cce381eda286dd8ad02ef35c50e8f702d34d3b4dafd5bfbf829916b4d29d1f532bbaaef6

                • memory/1120-20-0x0000000001BC0000-0x0000000001BE7000-memory.dmp

                  Filesize

                  156KB

                • memory/1120-19-0x0000000001BC0000-0x0000000001BE7000-memory.dmp

                  Filesize

                  156KB

                • memory/1120-18-0x0000000001BC0000-0x0000000001BE7000-memory.dmp

                  Filesize

                  156KB

                • memory/1120-17-0x0000000001BC0000-0x0000000001BE7000-memory.dmp

                  Filesize

                  156KB

                • memory/1120-15-0x0000000001BC0000-0x0000000001BE7000-memory.dmp

                  Filesize

                  156KB

                • memory/1172-24-0x0000000000120000-0x0000000000147000-memory.dmp

                  Filesize

                  156KB

                • memory/1172-23-0x0000000000120000-0x0000000000147000-memory.dmp

                  Filesize

                  156KB

                • memory/1172-25-0x0000000000120000-0x0000000000147000-memory.dmp

                  Filesize

                  156KB

                • memory/1172-22-0x0000000000120000-0x0000000000147000-memory.dmp

                  Filesize

                  156KB

                • memory/1200-27-0x0000000002B40000-0x0000000002B67000-memory.dmp

                  Filesize

                  156KB

                • memory/1200-28-0x0000000002B40000-0x0000000002B67000-memory.dmp

                  Filesize

                  156KB

                • memory/1200-29-0x0000000002B40000-0x0000000002B67000-memory.dmp

                  Filesize

                  156KB

                • memory/1200-30-0x0000000002B40000-0x0000000002B67000-memory.dmp

                  Filesize

                  156KB

                • memory/1216-33-0x0000000000250000-0x0000000000277000-memory.dmp

                  Filesize

                  156KB

                • memory/1216-35-0x0000000000250000-0x0000000000277000-memory.dmp

                  Filesize

                  156KB

                • memory/1216-34-0x0000000000250000-0x0000000000277000-memory.dmp

                  Filesize

                  156KB

                • memory/1216-32-0x0000000000250000-0x0000000000277000-memory.dmp

                  Filesize

                  156KB

                • memory/1220-37-0x0000000000300000-0x0000000000327000-memory.dmp

                  Filesize

                  156KB

                • memory/1220-76-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-68-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-66-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-62-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-60-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-58-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-56-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-54-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-53-0x00000000777C0000-0x00000000777C1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-51-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-49-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-47-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-45-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-43-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-41-0x0000000000300000-0x0000000000327000-memory.dmp

                  Filesize

                  156KB

                • memory/1220-72-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-74-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-134-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-78-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-80-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-70-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-64-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-179-0x0000000000400000-0x0000000000482E5A-memory.dmp

                  Filesize

                  523KB

                • memory/1220-42-0x0000000000300000-0x0000000000327000-memory.dmp

                  Filesize

                  156KB

                • memory/1220-195-0x0000000000400000-0x0000000000482E5A-memory.dmp

                  Filesize

                  523KB

                • memory/1220-196-0x0000000000300000-0x0000000000327000-memory.dmp

                  Filesize

                  156KB

                • memory/1220-1-0x0000000000220000-0x0000000000221000-memory.dmp

                  Filesize

                  4KB

                • memory/1220-0-0x0000000000400000-0x0000000000482E5A-memory.dmp

                  Filesize

                  523KB

                • memory/1220-3-0x0000000000400000-0x0000000000482E5A-memory.dmp

                  Filesize

                  523KB

                • memory/1220-38-0x0000000000300000-0x0000000000327000-memory.dmp

                  Filesize

                  156KB

                • memory/1220-39-0x0000000000300000-0x0000000000327000-memory.dmp

                  Filesize

                  156KB

                • memory/1220-40-0x0000000000300000-0x0000000000327000-memory.dmp

                  Filesize

                  156KB

                • memory/1220-2-0x0000000000400000-0x0000000000482E5A-memory.dmp

                  Filesize

                  523KB

                • memory/2440-310-0x00000000001A0000-0x00000000001A1000-memory.dmp

                  Filesize

                  4KB

                • memory/2440-202-0x00000000777C0000-0x00000000777C1000-memory.dmp

                  Filesize

                  4KB

                • memory/2440-200-0x0000000000050000-0x0000000000077000-memory.dmp

                  Filesize

                  156KB

                • memory/2440-422-0x0000000000050000-0x0000000000077000-memory.dmp

                  Filesize

                  156KB

                • memory/2756-16-0x0000000000400000-0x0000000000482E5A-memory.dmp

                  Filesize

                  523KB

                • memory/2756-14-0x0000000000400000-0x0000000000482E5A-memory.dmp

                  Filesize

                  523KB

                • memory/2756-306-0x0000000000400000-0x0000000000482E5A-memory.dmp

                  Filesize

                  523KB