Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-01-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
7b64f943dd4c0922baf34d73dc673cb2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b64f943dd4c0922baf34d73dc673cb2.exe
Resource
win10v2004-20231222-en
General
-
Target
7b64f943dd4c0922baf34d73dc673cb2.exe
-
Size
262KB
-
MD5
7b64f943dd4c0922baf34d73dc673cb2
-
SHA1
52f2e206f85e0184f24ae3225bbf9493d6dd5dfc
-
SHA256
f706eee356d07bade5c477067e579804ba32f3e28472999a8742d12af45d28a2
-
SHA512
e60fa8ef0933279a2c925c1316c60626d5a8dc8bf3822593277727fa7172f01367bab1331e0f8be19089da0bb9d17054996b0ad1b81fc57480bde2e6247af36a
-
SSDEEP
6144:/58Gp+df0afmVTRMdbdpn94sLrNXel9Bb98+MAt/:B8YkfXf4TRMl94svNuzBb9Zr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1700 moewo.exe -
Loads dropped DLL 1 IoCs
pid Process 1748 7b64f943dd4c0922baf34d73dc673cb2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\{9DB029C8-CEC5-AD4E-0EA6-58580BF07B45} = "C:\\Users\\Admin\\AppData\\Roaming\\Ylitl\\moewo.exe" moewo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1748 set thread context of 1564 1748 7b64f943dd4c0922baf34d73dc673cb2.exe 29 -
Program crash 2 IoCs
pid pid_target Process procid_target 296 1564 WerFault.exe 29 1568 296 WerFault.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Privacy 7b64f943dd4c0922baf34d73dc673cb2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 7b64f943dd4c0922baf34d73dc673cb2.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe 1700 moewo.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1748 7b64f943dd4c0922baf34d73dc673cb2.exe Token: SeSecurityPrivilege 1748 7b64f943dd4c0922baf34d73dc673cb2.exe Token: SeSecurityPrivilege 1748 7b64f943dd4c0922baf34d73dc673cb2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1748 7b64f943dd4c0922baf34d73dc673cb2.exe 1700 moewo.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1748 wrote to memory of 1700 1748 7b64f943dd4c0922baf34d73dc673cb2.exe 28 PID 1748 wrote to memory of 1700 1748 7b64f943dd4c0922baf34d73dc673cb2.exe 28 PID 1748 wrote to memory of 1700 1748 7b64f943dd4c0922baf34d73dc673cb2.exe 28 PID 1748 wrote to memory of 1700 1748 7b64f943dd4c0922baf34d73dc673cb2.exe 28 PID 1700 wrote to memory of 1112 1700 moewo.exe 13 PID 1700 wrote to memory of 1112 1700 moewo.exe 13 PID 1700 wrote to memory of 1112 1700 moewo.exe 13 PID 1700 wrote to memory of 1112 1700 moewo.exe 13 PID 1700 wrote to memory of 1112 1700 moewo.exe 13 PID 1700 wrote to memory of 1216 1700 moewo.exe 16 PID 1700 wrote to memory of 1216 1700 moewo.exe 16 PID 1700 wrote to memory of 1216 1700 moewo.exe 16 PID 1700 wrote to memory of 1216 1700 moewo.exe 16 PID 1700 wrote to memory of 1216 1700 moewo.exe 16 PID 1700 wrote to memory of 1284 1700 moewo.exe 14 PID 1700 wrote to memory of 1284 1700 moewo.exe 14 PID 1700 wrote to memory of 1284 1700 moewo.exe 14 PID 1700 wrote to memory of 1284 1700 moewo.exe 14 PID 1700 wrote to memory of 1284 1700 moewo.exe 14 PID 1700 wrote to memory of 1600 1700 moewo.exe 20 PID 1700 wrote to memory of 1600 1700 moewo.exe 20 PID 1700 wrote to memory of 1600 1700 moewo.exe 20 PID 1700 wrote to memory of 1600 1700 moewo.exe 20 PID 1700 wrote to memory of 1600 1700 moewo.exe 20 PID 1700 wrote to memory of 1748 1700 moewo.exe 27 PID 1700 wrote to memory of 1748 1700 moewo.exe 27 PID 1700 wrote to memory of 1748 1700 moewo.exe 27 PID 1700 wrote to memory of 1748 1700 moewo.exe 27 PID 1700 wrote to memory of 1748 1700 moewo.exe 27 PID 1748 wrote to memory of 1564 1748 7b64f943dd4c0922baf34d73dc673cb2.exe 29 PID 1748 wrote to memory of 1564 1748 7b64f943dd4c0922baf34d73dc673cb2.exe 29 PID 1748 wrote to memory of 1564 1748 7b64f943dd4c0922baf34d73dc673cb2.exe 29 PID 1748 wrote to memory of 1564 1748 7b64f943dd4c0922baf34d73dc673cb2.exe 29 PID 1748 wrote to memory of 1564 1748 7b64f943dd4c0922baf34d73dc673cb2.exe 29 PID 1748 wrote to memory of 1564 1748 7b64f943dd4c0922baf34d73dc673cb2.exe 29 PID 1748 wrote to memory of 1564 1748 7b64f943dd4c0922baf34d73dc673cb2.exe 29 PID 1748 wrote to memory of 1564 1748 7b64f943dd4c0922baf34d73dc673cb2.exe 29 PID 1748 wrote to memory of 1564 1748 7b64f943dd4c0922baf34d73dc673cb2.exe 29 PID 1564 wrote to memory of 296 1564 cmd.exe 31 PID 1564 wrote to memory of 296 1564 cmd.exe 31 PID 1564 wrote to memory of 296 1564 cmd.exe 31 PID 1564 wrote to memory of 296 1564 cmd.exe 31 PID 1700 wrote to memory of 1624 1700 moewo.exe 30 PID 1700 wrote to memory of 1624 1700 moewo.exe 30 PID 1700 wrote to memory of 1624 1700 moewo.exe 30 PID 1700 wrote to memory of 1624 1700 moewo.exe 30 PID 1700 wrote to memory of 1624 1700 moewo.exe 30 PID 1700 wrote to memory of 296 1700 moewo.exe 31 PID 1700 wrote to memory of 296 1700 moewo.exe 31 PID 1700 wrote to memory of 296 1700 moewo.exe 31 PID 1700 wrote to memory of 296 1700 moewo.exe 31 PID 1700 wrote to memory of 296 1700 moewo.exe 31 PID 296 wrote to memory of 1568 296 WerFault.exe 32 PID 296 wrote to memory of 1568 296 WerFault.exe 32 PID 296 wrote to memory of 1568 296 WerFault.exe 32 PID 296 wrote to memory of 1568 296 WerFault.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\7b64f943dd4c0922baf34d73dc673cb2.exe"C:\Users\Admin\AppData\Local\Temp\7b64f943dd4c0922baf34d73dc673cb2.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Roaming\Ylitl\moewo.exe"C:\Users\Admin\AppData\Roaming\Ylitl\moewo.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1700
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd0f8c5bf.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 1164⤵
- Program crash
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 296 -s 5365⤵
- Program crash
PID:1568
-
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1216
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1600
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "4449869711033818924962026904407812889531793647-1180426640-326568025-1596758403"1⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366B
MD5572d2f7526f1cc860618ae8691eba0b5
SHA1abc2d6ae8baa09ce6998e03f441c66e33ff638d1
SHA2566fbc1f18f60cf8216a3fb209aca169dde2ccb02df6061bd1cdf3e501abb7581d
SHA51229728e64a499afbb4f8d21fac2037c02f4ffed2a5cf2058ddb2fb2246158be5e5d5a6c40b44257b729f171e2583c4c90b5a0a165e6dfea5fe882c9f494dda84c
-
Filesize
262KB
MD56697ba1782e32d0eb9f461dd2f033965
SHA18f04499e9819166a390bfa3da5506f6f9bbdfabd
SHA256b0011e861d0fb37051c0f90df4b372216da003cc04b135a248f3aba4e0f84982
SHA512f9042b8a3eef0fb8cb07970c51d98a9ddb1c1bc2d5243b0d96069e59af431f94a825b259028a53fb1688c9f452a9cb0889119cf6906f4d199fac8b4fffe30fca