Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 01:42
Static task
static1
Behavioral task
behavioral1
Sample
c4a6a667d280bf58172d70b5cc2ab283.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4a6a667d280bf58172d70b5cc2ab283.exe
Resource
win10v2004-20240226-en
General
-
Target
c4a6a667d280bf58172d70b5cc2ab283.exe
-
Size
104KB
-
MD5
c4a6a667d280bf58172d70b5cc2ab283
-
SHA1
591be136c30f6141ca137fb5259fc0d1e1e8c956
-
SHA256
6fdf71cc2e23c89add7da89bd3960d20f65ab166d5d3facdb739bde5950d3df2
-
SHA512
2e2dc85a4c4e6a61a1d666d23d1aec9244725e83a25d960fc641acf65e8ce2e51402791bc2af74c697472b1a3f852e371a0a4de955013d04dc90c3d04355705b
-
SSDEEP
1536:S6HGhwSsky22UJ826eeJo5FRfW5RWTiXJ3j++PObZJTA5:S6HGhGkckeJoFfYWTiXJ3i+AZJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2588 cyavznuc.exe -
Executes dropped EXE 2 IoCs
pid Process 2588 cyavznuc.exe 2580 cyavznuc.exe -
Loads dropped DLL 6 IoCs
pid Process 2196 c4a6a667d280bf58172d70b5cc2ab283.exe 2196 c4a6a667d280bf58172d70b5cc2ab283.exe 2588 cyavznuc.exe 2588 cyavznuc.exe 2588 cyavznuc.exe 2588 cyavznuc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\cyavznuc.exe c4a6a667d280bf58172d70b5cc2ab283.exe File opened for modification \??\c:\windows\SysWOW64\cyavznuc.exe c4a6a667d280bf58172d70b5cc2ab283.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00000000-0000-0000-0000-000000000001}\InprocServer32 c4a6a667d280bf58172d70b5cc2ab283.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node c4a6a667d280bf58172d70b5cc2ab283.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID c4a6a667d280bf58172d70b5cc2ab283.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00000000-0000-0000-0000-000000000001} c4a6a667d280bf58172d70b5cc2ab283.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00000000-0000-0000-0000-000000000001}\InprocServer32 cyavznuc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00000000-0000-0000-0000-000000000001}\InprocServer32 cyavznuc.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2012 2196 c4a6a667d280bf58172d70b5cc2ab283.exe 28 PID 2196 wrote to memory of 2012 2196 c4a6a667d280bf58172d70b5cc2ab283.exe 28 PID 2196 wrote to memory of 2012 2196 c4a6a667d280bf58172d70b5cc2ab283.exe 28 PID 2196 wrote to memory of 2012 2196 c4a6a667d280bf58172d70b5cc2ab283.exe 28 PID 2196 wrote to memory of 2012 2196 c4a6a667d280bf58172d70b5cc2ab283.exe 28 PID 2196 wrote to memory of 2012 2196 c4a6a667d280bf58172d70b5cc2ab283.exe 28 PID 2196 wrote to memory of 2012 2196 c4a6a667d280bf58172d70b5cc2ab283.exe 28 PID 2196 wrote to memory of 2588 2196 c4a6a667d280bf58172d70b5cc2ab283.exe 29 PID 2196 wrote to memory of 2588 2196 c4a6a667d280bf58172d70b5cc2ab283.exe 29 PID 2196 wrote to memory of 2588 2196 c4a6a667d280bf58172d70b5cc2ab283.exe 29 PID 2196 wrote to memory of 2588 2196 c4a6a667d280bf58172d70b5cc2ab283.exe 29 PID 2588 wrote to memory of 2148 2588 cyavznuc.exe 30 PID 2588 wrote to memory of 2148 2588 cyavznuc.exe 30 PID 2588 wrote to memory of 2148 2588 cyavznuc.exe 30 PID 2588 wrote to memory of 2148 2588 cyavznuc.exe 30 PID 2588 wrote to memory of 2148 2588 cyavznuc.exe 30 PID 2588 wrote to memory of 2148 2588 cyavznuc.exe 30 PID 2588 wrote to memory of 2148 2588 cyavznuc.exe 30 PID 2588 wrote to memory of 2580 2588 cyavznuc.exe 31 PID 2588 wrote to memory of 2580 2588 cyavznuc.exe 31 PID 2588 wrote to memory of 2580 2588 cyavznuc.exe 31 PID 2588 wrote to memory of 2580 2588 cyavznuc.exe 31 PID 2580 wrote to memory of 2760 2580 cyavznuc.exe 32 PID 2580 wrote to memory of 2760 2580 cyavznuc.exe 32 PID 2580 wrote to memory of 2760 2580 cyavznuc.exe 32 PID 2580 wrote to memory of 2760 2580 cyavznuc.exe 32 PID 2580 wrote to memory of 2760 2580 cyavznuc.exe 32 PID 2580 wrote to memory of 2760 2580 cyavznuc.exe 32 PID 2580 wrote to memory of 2760 2580 cyavznuc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4a6a667d280bf58172d70b5cc2ab283.exe"C:\Users\Admin\AppData\Local\Temp\c4a6a667d280bf58172d70b5cc2ab283.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s2⤵PID:2012
-
-
C:\windows\SysWOW64\cyavznuc.exe"C:\windows\system32\cyavznuc.exe" -kill c:\users\admin\appdata\local\temp\c4a6a667d280bf58172d70b5cc2ab283.exe /install2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s3⤵PID:2148
-
-
C:\windows\SysWOW64\cyavznuc.exe"C:\windows\system32\cyavznuc.exe" -kill c:\windows\syswow64\cyavznuc.exe /install /install3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s4⤵PID:2760
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD5c4a6a667d280bf58172d70b5cc2ab283
SHA1591be136c30f6141ca137fb5259fc0d1e1e8c956
SHA2566fdf71cc2e23c89add7da89bd3960d20f65ab166d5d3facdb739bde5950d3df2
SHA5122e2dc85a4c4e6a61a1d666d23d1aec9244725e83a25d960fc641acf65e8ce2e51402791bc2af74c697472b1a3f852e371a0a4de955013d04dc90c3d04355705b