Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09-03-2024 21:09
Static task
static1
Behavioral task
behavioral1
Sample
bccfc1708d0a502c7e162d44e76ea6a4.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
bccfc1708d0a502c7e162d44e76ea6a4.exe
Resource
win10v2004-20240226-en
General
-
Target
bccfc1708d0a502c7e162d44e76ea6a4.exe
-
Size
293KB
-
MD5
bccfc1708d0a502c7e162d44e76ea6a4
-
SHA1
95f5e2037a7c5a55c2788970d0be3da541485fed
-
SHA256
b8914b69268957fa1fa00e5bf3025f307960f2f4ba9168614f45eb713cf4ce36
-
SHA512
3cac224121f9cab8e6c9f63a267e561f081d1b201987dc43435af895750b5daae868463ddb3eb2d18fcff2a77e104b56b34cadea2147807d2ef70974a8f711c9
-
SSDEEP
6144:yPdM6MANEVzGlcEDUl4qaRYVQOJTGbusJRhgnGXcbD7Xm2BeddhMHWDiu:ENEh8cSLqdJsisDhgnGMBBedDM2Dt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2968 izcye.exe -
Loads dropped DLL 2 IoCs
pid Process 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\{58C936C8-997F-AD4E-D42C-E216E5D1C10B} = "C:\\Users\\Admin\\AppData\\Roaming\\Zafei\\izcye.exe" izcye.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2908 set thread context of 1672 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2120 1672 WerFault.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Privacy bccfc1708d0a502c7e162d44e76ea6a4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" bccfc1708d0a502c7e162d44e76ea6a4.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe 2968 izcye.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe Token: SeSecurityPrivilege 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe Token: SeSecurityPrivilege 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 2968 izcye.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2968 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 28 PID 2908 wrote to memory of 2968 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 28 PID 2908 wrote to memory of 2968 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 28 PID 2908 wrote to memory of 2968 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 28 PID 2968 wrote to memory of 1080 2968 izcye.exe 18 PID 2968 wrote to memory of 1080 2968 izcye.exe 18 PID 2968 wrote to memory of 1080 2968 izcye.exe 18 PID 2968 wrote to memory of 1080 2968 izcye.exe 18 PID 2968 wrote to memory of 1080 2968 izcye.exe 18 PID 2968 wrote to memory of 1088 2968 izcye.exe 19 PID 2968 wrote to memory of 1088 2968 izcye.exe 19 PID 2968 wrote to memory of 1088 2968 izcye.exe 19 PID 2968 wrote to memory of 1088 2968 izcye.exe 19 PID 2968 wrote to memory of 1088 2968 izcye.exe 19 PID 2968 wrote to memory of 1156 2968 izcye.exe 20 PID 2968 wrote to memory of 1156 2968 izcye.exe 20 PID 2968 wrote to memory of 1156 2968 izcye.exe 20 PID 2968 wrote to memory of 1156 2968 izcye.exe 20 PID 2968 wrote to memory of 1156 2968 izcye.exe 20 PID 2968 wrote to memory of 1508 2968 izcye.exe 23 PID 2968 wrote to memory of 1508 2968 izcye.exe 23 PID 2968 wrote to memory of 1508 2968 izcye.exe 23 PID 2968 wrote to memory of 1508 2968 izcye.exe 23 PID 2968 wrote to memory of 1508 2968 izcye.exe 23 PID 2968 wrote to memory of 2908 2968 izcye.exe 27 PID 2968 wrote to memory of 2908 2968 izcye.exe 27 PID 2968 wrote to memory of 2908 2968 izcye.exe 27 PID 2968 wrote to memory of 2908 2968 izcye.exe 27 PID 2968 wrote to memory of 2908 2968 izcye.exe 27 PID 2908 wrote to memory of 1672 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 29 PID 2908 wrote to memory of 1672 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 29 PID 2908 wrote to memory of 1672 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 29 PID 2908 wrote to memory of 1672 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 29 PID 2908 wrote to memory of 1672 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 29 PID 2908 wrote to memory of 1672 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 29 PID 2908 wrote to memory of 1672 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 29 PID 2908 wrote to memory of 1672 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 29 PID 2908 wrote to memory of 1672 2908 bccfc1708d0a502c7e162d44e76ea6a4.exe 29 PID 1672 wrote to memory of 2120 1672 cmd.exe 31 PID 1672 wrote to memory of 2120 1672 cmd.exe 31 PID 1672 wrote to memory of 2120 1672 cmd.exe 31 PID 1672 wrote to memory of 2120 1672 cmd.exe 31 PID 2968 wrote to memory of 2032 2968 izcye.exe 30 PID 2968 wrote to memory of 2032 2968 izcye.exe 30 PID 2968 wrote to memory of 2032 2968 izcye.exe 30 PID 2968 wrote to memory of 2032 2968 izcye.exe 30 PID 2968 wrote to memory of 2032 2968 izcye.exe 30 PID 2968 wrote to memory of 2120 2968 izcye.exe 31 PID 2968 wrote to memory of 2120 2968 izcye.exe 31 PID 2968 wrote to memory of 2120 2968 izcye.exe 31 PID 2968 wrote to memory of 2120 2968 izcye.exe 31 PID 2968 wrote to memory of 2120 2968 izcye.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1080
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1088
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\bccfc1708d0a502c7e162d44e76ea6a4.exe"C:\Users\Admin\AppData\Local\Temp\bccfc1708d0a502c7e162d44e76ea6a4.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Roaming\Zafei\izcye.exe"C:\Users\Admin\AppData\Roaming\Zafei\izcye.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2968
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp11bda06d.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 1124⤵
- Program crash
PID:2120
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1508
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-688310912-1406257393741478682-21665164610069051731969759215585827971950474690"1⤵PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366B
MD5df2354167d9cd8f5eb552ae483bb51f7
SHA1a5678451279d3b59866df934e034954b8060c1d6
SHA256b76fa99b8088286f4edce4ab2cb3d66b3e7e1625b5a43634adc5e0a621989943
SHA51294b8efe9bf43f700ce90018a9622085ea09414b1be88aee624569c4dcd442151ecafb8267efea98c2dec8edf395289ff7d09966edea6a55fa4d7654a7bacface
-
Filesize
293KB
MD5bb6106bbeac0ed99215bb01a0b539efc
SHA147feb751ee1c1e898d78e283d543fcba9043b9f4
SHA256808c7d0c040c624b28f33e72ac6ee834063ce39a70a6130bb28c2eb9e6e1c0b0
SHA512b81344109b131dfac0b18e84f4ea8d3c52148041a2ee6af03c7a1f7a920bcf3976b475a46fdb95416597d6f6acdbc8612912cdf1a478ccebb1dce976bcfd783c