Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21-01-2024 11:09
Behavioral task
behavioral1
Sample
6d26bb477af79efac4b9b274685cca30.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6d26bb477af79efac4b9b274685cca30.exe
Resource
win10v2004-20231215-en
General
-
Target
6d26bb477af79efac4b9b274685cca30.exe
-
Size
180KB
-
MD5
6d26bb477af79efac4b9b274685cca30
-
SHA1
4582b22d230d5990457aab752dc15d83cda873db
-
SHA256
89cd5c3f4fb6834f8104b1fd1ba39222e37de5d8b20a7bb85fa463a88d9baaee
-
SHA512
cef52da620ca69bd908992da9f17843f0c44ebec0f576d688ce72a2a63e8dab71825225f8a4557a449f9c474cc68148ea87f75c24aa513a5a28f23d608deff87
-
SSDEEP
3072:XsRRJgNB10Y1uby6Tfw4m6ZnjShSc6TCkvKEWF7rh8KGT5rzNzHvz1CLhrCDjZR:XuJ6BCYI3THk6OuRWFfhhGT5rzNDvk83
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 592 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
tiej.exepid process 2776 tiej.exe -
Loads dropped DLL 2 IoCs
Processes:
6d26bb477af79efac4b9b274685cca30.exepid process 2276 6d26bb477af79efac4b9b274685cca30.exe 2276 6d26bb477af79efac4b9b274685cca30.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Ytveze\tiej.exe upx behavioral1/memory/2276-11-0x0000000000400000-0x00000000027B5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tiej.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\{9DB029C8-CEC5-AD4E-0EA6-58580BF07B45} = "C:\\Users\\Admin\\AppData\\Roaming\\Ytveze\\tiej.exe" tiej.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6d26bb477af79efac4b9b274685cca30.exedescription pid process target process PID 2276 set thread context of 592 2276 6d26bb477af79efac4b9b274685cca30.exe cmd.exe -
Processes:
6d26bb477af79efac4b9b274685cca30.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Privacy 6d26bb477af79efac4b9b274685cca30.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 6d26bb477af79efac4b9b274685cca30.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
tiej.exepid process 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe 2776 tiej.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
6d26bb477af79efac4b9b274685cca30.exedescription pid process Token: SeSecurityPrivilege 2276 6d26bb477af79efac4b9b274685cca30.exe Token: SeSecurityPrivilege 2276 6d26bb477af79efac4b9b274685cca30.exe Token: SeSecurityPrivilege 2276 6d26bb477af79efac4b9b274685cca30.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
6d26bb477af79efac4b9b274685cca30.exetiej.exepid process 2276 6d26bb477af79efac4b9b274685cca30.exe 2776 tiej.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
6d26bb477af79efac4b9b274685cca30.exetiej.exedescription pid process target process PID 2276 wrote to memory of 2776 2276 6d26bb477af79efac4b9b274685cca30.exe tiej.exe PID 2276 wrote to memory of 2776 2276 6d26bb477af79efac4b9b274685cca30.exe tiej.exe PID 2276 wrote to memory of 2776 2276 6d26bb477af79efac4b9b274685cca30.exe tiej.exe PID 2276 wrote to memory of 2776 2276 6d26bb477af79efac4b9b274685cca30.exe tiej.exe PID 2776 wrote to memory of 1120 2776 tiej.exe taskhost.exe PID 2776 wrote to memory of 1120 2776 tiej.exe taskhost.exe PID 2776 wrote to memory of 1120 2776 tiej.exe taskhost.exe PID 2776 wrote to memory of 1120 2776 tiej.exe taskhost.exe PID 2776 wrote to memory of 1120 2776 tiej.exe taskhost.exe PID 2776 wrote to memory of 1184 2776 tiej.exe Dwm.exe PID 2776 wrote to memory of 1184 2776 tiej.exe Dwm.exe PID 2776 wrote to memory of 1184 2776 tiej.exe Dwm.exe PID 2776 wrote to memory of 1184 2776 tiej.exe Dwm.exe PID 2776 wrote to memory of 1184 2776 tiej.exe Dwm.exe PID 2776 wrote to memory of 1264 2776 tiej.exe Explorer.EXE PID 2776 wrote to memory of 1264 2776 tiej.exe Explorer.EXE PID 2776 wrote to memory of 1264 2776 tiej.exe Explorer.EXE PID 2776 wrote to memory of 1264 2776 tiej.exe Explorer.EXE PID 2776 wrote to memory of 1264 2776 tiej.exe Explorer.EXE PID 2776 wrote to memory of 1096 2776 tiej.exe DllHost.exe PID 2776 wrote to memory of 1096 2776 tiej.exe DllHost.exe PID 2776 wrote to memory of 1096 2776 tiej.exe DllHost.exe PID 2776 wrote to memory of 1096 2776 tiej.exe DllHost.exe PID 2776 wrote to memory of 1096 2776 tiej.exe DllHost.exe PID 2776 wrote to memory of 2276 2776 tiej.exe 6d26bb477af79efac4b9b274685cca30.exe PID 2776 wrote to memory of 2276 2776 tiej.exe 6d26bb477af79efac4b9b274685cca30.exe PID 2776 wrote to memory of 2276 2776 tiej.exe 6d26bb477af79efac4b9b274685cca30.exe PID 2776 wrote to memory of 2276 2776 tiej.exe 6d26bb477af79efac4b9b274685cca30.exe PID 2776 wrote to memory of 2276 2776 tiej.exe 6d26bb477af79efac4b9b274685cca30.exe PID 2276 wrote to memory of 592 2276 6d26bb477af79efac4b9b274685cca30.exe cmd.exe PID 2276 wrote to memory of 592 2276 6d26bb477af79efac4b9b274685cca30.exe cmd.exe PID 2276 wrote to memory of 592 2276 6d26bb477af79efac4b9b274685cca30.exe cmd.exe PID 2276 wrote to memory of 592 2276 6d26bb477af79efac4b9b274685cca30.exe cmd.exe PID 2276 wrote to memory of 592 2276 6d26bb477af79efac4b9b274685cca30.exe cmd.exe PID 2276 wrote to memory of 592 2276 6d26bb477af79efac4b9b274685cca30.exe cmd.exe PID 2276 wrote to memory of 592 2276 6d26bb477af79efac4b9b274685cca30.exe cmd.exe PID 2276 wrote to memory of 592 2276 6d26bb477af79efac4b9b274685cca30.exe cmd.exe PID 2276 wrote to memory of 592 2276 6d26bb477af79efac4b9b274685cca30.exe cmd.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\6d26bb477af79efac4b9b274685cca30.exe"C:\Users\Admin\AppData\Local\Temp\6d26bb477af79efac4b9b274685cca30.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Ytveze\tiej.exe"C:\Users\Admin\AppData\Roaming\Ytveze\tiej.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp2691d502.bat"3⤵
- Deletes itself
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp2691d502.batFilesize
243B
MD5a5fac2c3eeb8a0cfa770eaffeb85b349
SHA147ab151d289be728449ff0e98c418a780b3019e5
SHA256cde3efbf7b5be6053eccc69fe1bafa2a330d0037de6d197e1d42dbbdcacd5ccc
SHA51276282628c9f09f9528a3b13e474ea44d2c6a4a1d2bc1cc81e00b7d1057612a865c34238b458ea5867ab17f631b4da7753f0f17f7f009d219abbde5a91412fbb0
-
C:\Users\Admin\AppData\Roaming\Kuow\ceig.zamFilesize
366B
MD5680e84794e9d38bac2621b816eb3cd7b
SHA14c38f371ebe54770c3eb117c07cc21cebf17dfe1
SHA2565ac48d042818f70062afb4f7345d947e641f216c1827a8ef474e12d092b180c9
SHA5125be349341370d85303dda21908f73bcdecc2a7db15f3cbec6ccbb78b703db2957c998901fccd97852331211c9b9de4d7db0456f8fe3087cfc90de6b0f9d68e70
-
C:\Users\Admin\AppData\Roaming\Ytveze\tiej.exeFilesize
180KB
MD59e2358d6cfaf6c18f20dd550d025894b
SHA1f310cec5796002ac2e70c890aef02c07174d5c99
SHA25690d9ff910148036f3043f5e5aa6839004dacfb70a5719d7b4a2036f5a3ceaa8f
SHA5124106cc1be5d70d297da6e7379b25d0f33a1af7dbd98a91d4e24d2d08a52b83f648a08dc55961cb097f7f6a9929a075a93c223396cdfb24db1b7bbcb9e03959d4
-
memory/592-274-0x0000000000050000-0x0000000000085000-memory.dmpFilesize
212KB
-
memory/592-174-0x0000000000050000-0x0000000000085000-memory.dmpFilesize
212KB
-
memory/592-176-0x00000000775D0000-0x00000000775D1000-memory.dmpFilesize
4KB
-
memory/592-271-0x0000000000200000-0x0000000000201000-memory.dmpFilesize
4KB
-
memory/1096-48-0x0000000001BA0000-0x0000000001BD5000-memory.dmpFilesize
212KB
-
memory/1096-50-0x0000000001BA0000-0x0000000001BD5000-memory.dmpFilesize
212KB
-
memory/1096-54-0x0000000001BA0000-0x0000000001BD5000-memory.dmpFilesize
212KB
-
memory/1096-52-0x0000000001BA0000-0x0000000001BD5000-memory.dmpFilesize
212KB
-
memory/1120-10-0x00000000005C0000-0x00000000005F5000-memory.dmpFilesize
212KB
-
memory/1120-21-0x00000000005C0000-0x00000000005F5000-memory.dmpFilesize
212KB
-
memory/1120-18-0x00000000005C0000-0x00000000005F5000-memory.dmpFilesize
212KB
-
memory/1120-16-0x00000000005C0000-0x00000000005F5000-memory.dmpFilesize
212KB
-
memory/1120-14-0x00000000005C0000-0x00000000005F5000-memory.dmpFilesize
212KB
-
memory/1184-30-0x0000000001BB0000-0x0000000001BE5000-memory.dmpFilesize
212KB
-
memory/1184-32-0x0000000001BB0000-0x0000000001BE5000-memory.dmpFilesize
212KB
-
memory/1184-27-0x0000000001BB0000-0x0000000001BE5000-memory.dmpFilesize
212KB
-
memory/1184-25-0x0000000001BB0000-0x0000000001BE5000-memory.dmpFilesize
212KB
-
memory/1264-41-0x0000000002C50000-0x0000000002C85000-memory.dmpFilesize
212KB
-
memory/1264-43-0x0000000002C50000-0x0000000002C85000-memory.dmpFilesize
212KB
-
memory/1264-39-0x0000000002C50000-0x0000000002C85000-memory.dmpFilesize
212KB
-
memory/1264-37-0x0000000002C50000-0x0000000002C85000-memory.dmpFilesize
212KB
-
memory/2276-29-0x0000000009A40000-0x000000000BDF5000-memory.dmpFilesize
35.7MB
-
memory/2276-77-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/2276-61-0x0000000000350000-0x0000000000385000-memory.dmpFilesize
212KB
-
memory/2276-63-0x0000000000350000-0x0000000000385000-memory.dmpFilesize
212KB
-
memory/2276-65-0x0000000000350000-0x0000000000385000-memory.dmpFilesize
212KB
-
memory/2276-66-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/2276-68-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/2276-69-0x00000000775D0000-0x00000000775D1000-memory.dmpFilesize
4KB
-
memory/2276-71-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/2276-73-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/2276-79-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/2276-59-0x0000000000350000-0x0000000000385000-memory.dmpFilesize
212KB
-
memory/2276-75-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/2276-161-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/2276-57-0x0000000000350000-0x0000000000385000-memory.dmpFilesize
212KB
-
memory/2276-11-0x0000000000400000-0x00000000027B5000-memory.dmpFilesize
35.7MB
-
memory/2276-36-0x0000000009A40000-0x000000000BDF5000-memory.dmpFilesize
35.7MB
-
memory/2276-180-0x0000000000400000-0x00000000027B5000-memory.dmpFilesize
35.7MB
-
memory/2276-20-0x0000000000400000-0x00000000027B5000-memory.dmpFilesize
35.7MB
-
memory/2276-13-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2776-45-0x0000000000400000-0x00000000027B5000-memory.dmpFilesize
35.7MB
-
memory/2776-275-0x0000000000400000-0x00000000027B5000-memory.dmpFilesize
35.7MB