Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15-01-2024 04:38
Static task
static1
Behavioral task
behavioral1
Sample
5c27a6dccc8b52f62ceaf960aa49517f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c27a6dccc8b52f62ceaf960aa49517f.exe
Resource
win10v2004-20231215-en
General
-
Target
5c27a6dccc8b52f62ceaf960aa49517f.exe
-
Size
135KB
-
MD5
5c27a6dccc8b52f62ceaf960aa49517f
-
SHA1
98d9da5cd787f7f2f3af6ad00df1cbf9e4d61a16
-
SHA256
d85d5411788893548814455de2d2a4d4b261681722bde12ab4a073734d79b580
-
SHA512
fffd9e752d705f4bd9eb89909e0a591ace4ef13d93f775ca340a1cb6591a9191e74b0304a5b6873ff2e455d75078008f91d8d48a9be95d44bf4e42c4875977dd
-
SSDEEP
3072:2EG2G/pSTW6UPb1WpXVxAaGBvbNvNbNJkvmhyPQbaDTUXGIDbwKDqCtrwdAxaVTi:hPypSTAoIDbByGPMsMP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hyxij.exe -
Executes dropped EXE 1 IoCs
pid Process 2432 hyxij.exe -
Loads dropped DLL 2 IoCs
pid Process 1936 5c27a6dccc8b52f62ceaf960aa49517f.exe 1936 5c27a6dccc8b52f62ceaf960aa49517f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\hyxij = "C:\\Users\\Admin\\hyxij.exe" hyxij.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe 2432 hyxij.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1936 5c27a6dccc8b52f62ceaf960aa49517f.exe 2432 hyxij.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2432 1936 5c27a6dccc8b52f62ceaf960aa49517f.exe 28 PID 1936 wrote to memory of 2432 1936 5c27a6dccc8b52f62ceaf960aa49517f.exe 28 PID 1936 wrote to memory of 2432 1936 5c27a6dccc8b52f62ceaf960aa49517f.exe 28 PID 1936 wrote to memory of 2432 1936 5c27a6dccc8b52f62ceaf960aa49517f.exe 28 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14 PID 2432 wrote to memory of 1936 2432 hyxij.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c27a6dccc8b52f62ceaf960aa49517f.exe"C:\Users\Admin\AppData\Local\Temp\5c27a6dccc8b52f62ceaf960aa49517f.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\hyxij.exe"C:\Users\Admin\hyxij.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD52d853f2ba76dcd5a604edd52d4413197
SHA157d3ec762a9b0fa6ca5c8d0838176126c94af806
SHA2564870ad4e3b8944b39412bdf0a8176c5c1bbfa9df3502950c2c7610b5da3b9bf3
SHA51280f591422575ed2f52f3f1b3a51c4eacb6063c18c3a0dcf885db2e88c692fb359ca075e25c95e9cab57732af9c81d1b22fc08c3e5256ac37be1f95344e64547a