Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
59c023b5e9b7c64112ee8f67e075d920.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59c023b5e9b7c64112ee8f67e075d920.exe
Resource
win10v2004-20231215-en
General
-
Target
59c023b5e9b7c64112ee8f67e075d920.exe
-
Size
193KB
-
MD5
59c023b5e9b7c64112ee8f67e075d920
-
SHA1
8c2b77e393014cd8af45c2ed0be324833f143106
-
SHA256
50ab75e395039e2fe9aa39430798ed788a1572deb73b2d65e5a135838b49d455
-
SHA512
63f413aba226e6248861580723b4009a0e8d41d6db83f0008c3a5a74f2b1bcb93dfe72c83472b9d1351316e5aa6180a60b2ab98f0d568f5469e159dc96c35926
-
SSDEEP
3072:agjERgXA5/Wg4KmbjQ/JaPrTsitEnyP4HU+BIhaeu/hht/RFb9S6Lb1N:aFgIug1mbjQ/w4r50OemDtrjJN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2440 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 niex.exe -
Loads dropped DLL 2 IoCs
pid Process 1220 59c023b5e9b7c64112ee8f67e075d920.exe 1220 59c023b5e9b7c64112ee8f67e075d920.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\{CC6911DD-0839-168B-0684-17D6DD2EA42E} = "C:\\Users\\Admin\\AppData\\Roaming\\Yzbyp\\niex.exe" niex.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1220 set thread context of 2440 1220 59c023b5e9b7c64112ee8f67e075d920.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Privacy 59c023b5e9b7c64112ee8f67e075d920.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 59c023b5e9b7c64112ee8f67e075d920.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7B4D4B1D-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe 2756 niex.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeSecurityPrivilege 1220 59c023b5e9b7c64112ee8f67e075d920.exe Token: SeSecurityPrivilege 1220 59c023b5e9b7c64112ee8f67e075d920.exe Token: SeSecurityPrivilege 1220 59c023b5e9b7c64112ee8f67e075d920.exe Token: SeManageVolumePrivilege 2892 WinMail.exe Token: SeSecurityPrivilege 2440 cmd.exe Token: SeManageVolumePrivilege 2996 WinMail.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2892 WinMail.exe 2996 WinMail.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2892 WinMail.exe 2996 WinMail.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2892 WinMail.exe 2996 WinMail.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2756 1220 59c023b5e9b7c64112ee8f67e075d920.exe 28 PID 1220 wrote to memory of 2756 1220 59c023b5e9b7c64112ee8f67e075d920.exe 28 PID 1220 wrote to memory of 2756 1220 59c023b5e9b7c64112ee8f67e075d920.exe 28 PID 1220 wrote to memory of 2756 1220 59c023b5e9b7c64112ee8f67e075d920.exe 28 PID 2756 wrote to memory of 1120 2756 niex.exe 19 PID 2756 wrote to memory of 1120 2756 niex.exe 19 PID 2756 wrote to memory of 1120 2756 niex.exe 19 PID 2756 wrote to memory of 1120 2756 niex.exe 19 PID 2756 wrote to memory of 1120 2756 niex.exe 19 PID 2756 wrote to memory of 1172 2756 niex.exe 20 PID 2756 wrote to memory of 1172 2756 niex.exe 20 PID 2756 wrote to memory of 1172 2756 niex.exe 20 PID 2756 wrote to memory of 1172 2756 niex.exe 20 PID 2756 wrote to memory of 1172 2756 niex.exe 20 PID 2756 wrote to memory of 1200 2756 niex.exe 21 PID 2756 wrote to memory of 1200 2756 niex.exe 21 PID 2756 wrote to memory of 1200 2756 niex.exe 21 PID 2756 wrote to memory of 1200 2756 niex.exe 21 PID 2756 wrote to memory of 1200 2756 niex.exe 21 PID 2756 wrote to memory of 1216 2756 niex.exe 23 PID 2756 wrote to memory of 1216 2756 niex.exe 23 PID 2756 wrote to memory of 1216 2756 niex.exe 23 PID 2756 wrote to memory of 1216 2756 niex.exe 23 PID 2756 wrote to memory of 1216 2756 niex.exe 23 PID 2756 wrote to memory of 1220 2756 niex.exe 27 PID 2756 wrote to memory of 1220 2756 niex.exe 27 PID 2756 wrote to memory of 1220 2756 niex.exe 27 PID 2756 wrote to memory of 1220 2756 niex.exe 27 PID 2756 wrote to memory of 1220 2756 niex.exe 27 PID 2756 wrote to memory of 2892 2756 niex.exe 29 PID 2756 wrote to memory of 2892 2756 niex.exe 29 PID 2756 wrote to memory of 2892 2756 niex.exe 29 PID 2756 wrote to memory of 2892 2756 niex.exe 29 PID 2756 wrote to memory of 2892 2756 niex.exe 29 PID 1220 wrote to memory of 2440 1220 59c023b5e9b7c64112ee8f67e075d920.exe 30 PID 1220 wrote to memory of 2440 1220 59c023b5e9b7c64112ee8f67e075d920.exe 30 PID 1220 wrote to memory of 2440 1220 59c023b5e9b7c64112ee8f67e075d920.exe 30 PID 1220 wrote to memory of 2440 1220 59c023b5e9b7c64112ee8f67e075d920.exe 30 PID 1220 wrote to memory of 2440 1220 59c023b5e9b7c64112ee8f67e075d920.exe 30 PID 1220 wrote to memory of 2440 1220 59c023b5e9b7c64112ee8f67e075d920.exe 30 PID 1220 wrote to memory of 2440 1220 59c023b5e9b7c64112ee8f67e075d920.exe 30 PID 1220 wrote to memory of 2440 1220 59c023b5e9b7c64112ee8f67e075d920.exe 30 PID 1220 wrote to memory of 2440 1220 59c023b5e9b7c64112ee8f67e075d920.exe 30 PID 2756 wrote to memory of 636 2756 niex.exe 32 PID 2756 wrote to memory of 636 2756 niex.exe 32 PID 2756 wrote to memory of 636 2756 niex.exe 32 PID 2756 wrote to memory of 636 2756 niex.exe 32 PID 2756 wrote to memory of 636 2756 niex.exe 32 PID 2756 wrote to memory of 2664 2756 niex.exe 34 PID 2756 wrote to memory of 2664 2756 niex.exe 34 PID 2756 wrote to memory of 2664 2756 niex.exe 34 PID 2756 wrote to memory of 2664 2756 niex.exe 34 PID 2756 wrote to memory of 2664 2756 niex.exe 34 PID 2756 wrote to memory of 2388 2756 niex.exe 37 PID 2756 wrote to memory of 2388 2756 niex.exe 37 PID 2756 wrote to memory of 2388 2756 niex.exe 37 PID 2756 wrote to memory of 2388 2756 niex.exe 37 PID 2756 wrote to memory of 2388 2756 niex.exe 37
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\59c023b5e9b7c64112ee8f67e075d920.exe"C:\Users\Admin\AppData\Local\Temp\59c023b5e9b7c64112ee8f67e075d920.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Roaming\Yzbyp\niex.exe"C:\Users\Admin\AppData\Roaming\Yzbyp\niex.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpdd609986.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1216
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2892
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:636
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2996
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2664
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558B
MD53cc0012f96f8f44164c18d7de05023d9
SHA1c8feb560d751fe720c8bdb53f5e78aa92abb9a9e
SHA2562654c273c211ae1afc60a7736153a853142e3db028417206948576d1d57bf5d5
SHA512626746176663e2460b18f1eb245306107060c172c4e65ad710dd75ec0b348d8f000342c0dd2f7ea3bb2e0796f61e1ddd2cd77c312d6a177ff2e70a10b68cc6af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590dcdf01716f4fe633b9694b48753118
SHA138a05f129316a9e5fcf5db064418b262b3ba0849
SHA256de209e9a2cb479887b2ce77f03c305d0cda131db63394e4a2a39b160dfc81147
SHA5125d538b3b9d47e3203fd4c2de7c7053b07bc4aebbe45dbdfaa72c91afe99d6b206e37e24bdb9eae0cd9faea699f340d70bedc5c9893c23501e2f756dac0ff99e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735
Filesize232B
MD5633808f9ea009b91fceda050828deed5
SHA1e0a9e61fd8e29e2d72df6bc411c910b3cdd1548f
SHA256d421cfd20b0f030f36ba6d64f4b267878b18d96c721dd6c8037455fc14b5aa26
SHA5123c1b526059f0d6224705d558b1447504c6d90be152018c12e3e232f5eb3dca3527a1e8ded220fd2cb792ee7ec58221e9e02aa25c8608413b16c735c6b634ee6d
-
Filesize
2.0MB
MD5a137d94335d44f121a15f78c1a12e9fe
SHA1392a5ec3df08b0488e716167f1e430a15b04fa81
SHA2566d9e4226917416b6d3d1007b1c4755f12efbb0993845a75138728a0ce1ab66e7
SHA512fb6231b8eb2b1ed3b336271d77e2766ba57edb759ff500016e47bf98315547a6a9c98e794b093d3f828f0482f4381c41a76b263eaeb315e36dd66752b0390390
-
Filesize
8KB
MD583c382ef8c69dca7f506eee871b3f3d2
SHA1ff6b1bb8632e0d484a59f50f7f8d15dd25dfe056
SHA2560e38cf9e110212eff24979c08d392db9f713f6e1c3c88b135973cabe56e32202
SHA5121aa89dfdac8ea2a84b5a9a78ad0d8ae82d3378d2ac611b82915454d596c67e8ad5c68e9532748e02dc5ba5ae50cf3564cfc2070790e5564800bfce44276e3ad3
-
Filesize
2.0MB
MD50158a3c08377aba75db0b2f9705b55c0
SHA16812ff07a47a5fdd8c0b5c0c0d34a330a54f7a84
SHA25663fdb62366d267820689c9eb341357ddbfad50fb0fb2c0ffbf73fab150ef226b
SHA512e6bcb3ca18ebb7ae515a8424ff1dfcf381ae97fb9f79bc4c0001f43e2942c813a4f03eb1bca86e0803c710bc307a0eaf7c093f350e14ce10e6f2fb90f3097234
-
Filesize
2.0MB
MD590806f7aec38dbc0a7aeb5b445effc24
SHA1970c31f4576b08dcbad5e11e88e8b17da633617e
SHA2560213847b52a2b325a3fff7b99c1f913d1bc53672750bc05fb8d042b0eeb48336
SHA512a07fee241d8714350492349eab9910cbda7d3601e496dfe173ab8dd7676b907de59c60faecc2bdd0c0c65e45cb3b744dde20ccbf830d02b896968d7314b092aa
-
Filesize
2.0MB
MD5c98ae98efcbd17cbace30f21cc3a083b
SHA1a183833d39a303356b56ef128337faff861e0fd2
SHA256ab242020a3b6584a6b5f243bf0baf66fc059d386325c9dbe38d6c9a933ff0f4d
SHA51270ae20e61219bc6c2bcd4766a3a3568f53f3cceccd3b1eecccda412f9a69103e4e8faea406d7275661d1e06e0752405f9438f1e7b82e591e99c959a90295d9d8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
243B
MD5f323e3e2b4a38b48bf5433884753f205
SHA120828419e7c0a7755ea7b80e6c16d3d243e90936
SHA2567c61def286b46705c578409b26c7ce23c75b6fa49f41dc705b84086d541aa21b
SHA512c99a5cf22102b08b91b652c9f179e3805b915a48bf7db09d431a5a4bd9ce5fe682dbf822dd1e96f50ec0a313dfd32b0fcad2ff40cfe9d9cb74488387a2227594
-
Filesize
366B
MD5b4c4640974d235d454e6e3e1e2cee2c7
SHA10012ef4e42b4cf245b366d99ab21e428eb367081
SHA2567b143e8d2f87a75c1f2bfb6321af80ee2261b16af00f68a0e1e762399b585af0
SHA512a30d37968d821b2e606a4318fad8c813bf367def687def86374bec2259af98e425f23830abb428dd9fb52f96e41884e671843f8752cf15d0bc40f50a08afd453
-
Filesize
193KB
MD52a6665e7a113e10e4d6c07b880b02d54
SHA1102da5a569d8501be9116723a225c5cd2387066e
SHA25689c56474d8d7e17983be5590a3d3c4e56a1e998da5140912dc491c639a729675
SHA512973bcd96029d5940fd8bb11229f0e9ff529605c425fd131c4c8ac853cce381eda286dd8ad02ef35c50e8f702d34d3b4dafd5bfbf829916b4d29d1f532bbaaef6