Analysis
-
max time kernel
152s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 08:10
Static task
static1
Behavioral task
behavioral1
Sample
ae188c83f4a3da196407f1c312d57f07.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae188c83f4a3da196407f1c312d57f07.exe
Resource
win10v2004-20240226-en
General
-
Target
ae188c83f4a3da196407f1c312d57f07.exe
-
Size
270KB
-
MD5
ae188c83f4a3da196407f1c312d57f07
-
SHA1
e981f1edfe3cc090b86452c3c7ae682c3a3e5973
-
SHA256
4fc506d0810ba53a6ad690c0119afc74bd18768c2d66ca1c6a78abe4b0c0c797
-
SHA512
53f5144d01909885b35e3963ca01f09b7fec22576a154c52dfffa622ade361e4194e16d15819c56daf68c152261f93a257c62a08bbe2ac52d294160ace753f37
-
SSDEEP
6144:/tjpxeyqvoArlO+Beip2/pWTxq/fnx7GDrRcJIcxyCq0hzfl:lAvo8nVq/PERcHxywl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2560 riwiy.exe -
Loads dropped DLL 2 IoCs
pid Process 2444 ae188c83f4a3da196407f1c312d57f07.exe 2444 ae188c83f4a3da196407f1c312d57f07.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\{716CE7C8-8449-AD4E-8B2B-CDD0BB2BEECD} = "C:\\Users\\Admin\\AppData\\Roaming\\Peve\\riwiy.exe" riwiy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2444 set thread context of 2632 2444 ae188c83f4a3da196407f1c312d57f07.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 1444 2632 WerFault.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Privacy ae188c83f4a3da196407f1c312d57f07.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" ae188c83f4a3da196407f1c312d57f07.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe 2560 riwiy.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2444 ae188c83f4a3da196407f1c312d57f07.exe 2560 riwiy.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2560 2444 ae188c83f4a3da196407f1c312d57f07.exe 28 PID 2444 wrote to memory of 2560 2444 ae188c83f4a3da196407f1c312d57f07.exe 28 PID 2444 wrote to memory of 2560 2444 ae188c83f4a3da196407f1c312d57f07.exe 28 PID 2444 wrote to memory of 2560 2444 ae188c83f4a3da196407f1c312d57f07.exe 28 PID 2560 wrote to memory of 1084 2560 riwiy.exe 13 PID 2560 wrote to memory of 1084 2560 riwiy.exe 13 PID 2560 wrote to memory of 1084 2560 riwiy.exe 13 PID 2560 wrote to memory of 1084 2560 riwiy.exe 13 PID 2560 wrote to memory of 1084 2560 riwiy.exe 13 PID 2560 wrote to memory of 1164 2560 riwiy.exe 11 PID 2560 wrote to memory of 1164 2560 riwiy.exe 11 PID 2560 wrote to memory of 1164 2560 riwiy.exe 11 PID 2560 wrote to memory of 1164 2560 riwiy.exe 11 PID 2560 wrote to memory of 1164 2560 riwiy.exe 11 PID 2560 wrote to memory of 1192 2560 riwiy.exe 10 PID 2560 wrote to memory of 1192 2560 riwiy.exe 10 PID 2560 wrote to memory of 1192 2560 riwiy.exe 10 PID 2560 wrote to memory of 1192 2560 riwiy.exe 10 PID 2560 wrote to memory of 1192 2560 riwiy.exe 10 PID 2560 wrote to memory of 1732 2560 riwiy.exe 9 PID 2560 wrote to memory of 1732 2560 riwiy.exe 9 PID 2560 wrote to memory of 1732 2560 riwiy.exe 9 PID 2560 wrote to memory of 1732 2560 riwiy.exe 9 PID 2560 wrote to memory of 1732 2560 riwiy.exe 9 PID 2560 wrote to memory of 2444 2560 riwiy.exe 15 PID 2560 wrote to memory of 2444 2560 riwiy.exe 15 PID 2560 wrote to memory of 2444 2560 riwiy.exe 15 PID 2560 wrote to memory of 2444 2560 riwiy.exe 15 PID 2560 wrote to memory of 2444 2560 riwiy.exe 15 PID 2444 wrote to memory of 2632 2444 ae188c83f4a3da196407f1c312d57f07.exe 29 PID 2444 wrote to memory of 2632 2444 ae188c83f4a3da196407f1c312d57f07.exe 29 PID 2444 wrote to memory of 2632 2444 ae188c83f4a3da196407f1c312d57f07.exe 29 PID 2444 wrote to memory of 2632 2444 ae188c83f4a3da196407f1c312d57f07.exe 29 PID 2444 wrote to memory of 2632 2444 ae188c83f4a3da196407f1c312d57f07.exe 29 PID 2444 wrote to memory of 2632 2444 ae188c83f4a3da196407f1c312d57f07.exe 29 PID 2444 wrote to memory of 2632 2444 ae188c83f4a3da196407f1c312d57f07.exe 29 PID 2444 wrote to memory of 2632 2444 ae188c83f4a3da196407f1c312d57f07.exe 29 PID 2444 wrote to memory of 2632 2444 ae188c83f4a3da196407f1c312d57f07.exe 29 PID 2632 wrote to memory of 1444 2632 cmd.exe 31 PID 2632 wrote to memory of 1444 2632 cmd.exe 31 PID 2632 wrote to memory of 1444 2632 cmd.exe 31 PID 2632 wrote to memory of 1444 2632 cmd.exe 31 PID 2560 wrote to memory of 1544 2560 riwiy.exe 30 PID 2560 wrote to memory of 1544 2560 riwiy.exe 30 PID 2560 wrote to memory of 1544 2560 riwiy.exe 30 PID 2560 wrote to memory of 1544 2560 riwiy.exe 30 PID 2560 wrote to memory of 1544 2560 riwiy.exe 30 PID 2560 wrote to memory of 1444 2560 riwiy.exe 31 PID 2560 wrote to memory of 1444 2560 riwiy.exe 31 PID 2560 wrote to memory of 1444 2560 riwiy.exe 31 PID 2560 wrote to memory of 1444 2560 riwiy.exe 31 PID 2560 wrote to memory of 1444 2560 riwiy.exe 31
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1732
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\ae188c83f4a3da196407f1c312d57f07.exe"C:\Users\Admin\AppData\Local\Temp\ae188c83f4a3da196407f1c312d57f07.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Roaming\Peve\riwiy.exe"C:\Users\Admin\AppData\Roaming\Peve\riwiy.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2560
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp02ff9f32.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 1164⤵
- Program crash
PID:1444
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1084
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1330239605-1217483278268509007971554122-873067105665237547819722134940400313"1⤵PID:1544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD59614a71edaca63389e64da73ddacc5da
SHA175f094cae51ecb345ff4cdd80ef3afe6f565d913
SHA256efcaa2bc1669d6860180d30bbdbe05aa6c2f74e27adb44f619a77566e68b7597
SHA512fd802f6974441721337a97a4c7fed74a5737e9d60009f9b8ca08ebd0aadd0d6e3bf601acae0194697d3b60c1999094013830c10e7946eb085a13c89a11061d50