Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
c5ef238856b6f471f5cf047c2a55f741.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5ef238856b6f471f5cf047c2a55f741.exe
Resource
win10v2004-20240226-en
General
-
Target
c5ef238856b6f471f5cf047c2a55f741.exe
-
Size
366KB
-
MD5
c5ef238856b6f471f5cf047c2a55f741
-
SHA1
48ea9c0c17287a1bc919ba6135b824f98e332aad
-
SHA256
46cbb37d075e320c5b82588db52cc5a2a62a7f3bce1f4e6aee89a12e279fb5c0
-
SHA512
9354020317b3f98e228f78e9d599d471747cf97f200403417e762c438c355f3f2e0f84cdeeac1c8879157c66c899e449c9d9a716aeea101c0d64713dfde372ea
-
SSDEEP
6144:aVJnk1h+bfx1qrGtkr7aMhimD2rlIc/BJd9jFOaUXnx/oqrAzC5e2P:ik14fx1qsMPidZLTfjFOaUXjrAzEem
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2076 yzviu.exe -
Loads dropped DLL 2 IoCs
pid Process 2820 c5ef238856b6f471f5cf047c2a55f741.exe 2820 c5ef238856b6f471f5cf047c2a55f741.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\{8AB77948-8466-AD4E-E8B6-6988D6F14A95} = "C:\\Users\\Admin\\AppData\\Roaming\\Uzme\\yzviu.exe" yzviu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2820 set thread context of 624 2820 c5ef238856b6f471f5cf047c2a55f741.exe 29 -
Program crash 2 IoCs
pid pid_target Process procid_target 1656 624 WerFault.exe 29 1596 1656 WerFault.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Privacy c5ef238856b6f471f5cf047c2a55f741.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" c5ef238856b6f471f5cf047c2a55f741.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe 2076 yzviu.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2820 c5ef238856b6f471f5cf047c2a55f741.exe 2076 yzviu.exe -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2076 2820 c5ef238856b6f471f5cf047c2a55f741.exe 28 PID 2820 wrote to memory of 2076 2820 c5ef238856b6f471f5cf047c2a55f741.exe 28 PID 2820 wrote to memory of 2076 2820 c5ef238856b6f471f5cf047c2a55f741.exe 28 PID 2820 wrote to memory of 2076 2820 c5ef238856b6f471f5cf047c2a55f741.exe 28 PID 2076 wrote to memory of 1256 2076 yzviu.exe 19 PID 2076 wrote to memory of 1256 2076 yzviu.exe 19 PID 2076 wrote to memory of 1256 2076 yzviu.exe 19 PID 2076 wrote to memory of 1256 2076 yzviu.exe 19 PID 2076 wrote to memory of 1256 2076 yzviu.exe 19 PID 2076 wrote to memory of 1352 2076 yzviu.exe 20 PID 2076 wrote to memory of 1352 2076 yzviu.exe 20 PID 2076 wrote to memory of 1352 2076 yzviu.exe 20 PID 2076 wrote to memory of 1352 2076 yzviu.exe 20 PID 2076 wrote to memory of 1352 2076 yzviu.exe 20 PID 2076 wrote to memory of 1396 2076 yzviu.exe 21 PID 2076 wrote to memory of 1396 2076 yzviu.exe 21 PID 2076 wrote to memory of 1396 2076 yzviu.exe 21 PID 2076 wrote to memory of 1396 2076 yzviu.exe 21 PID 2076 wrote to memory of 1396 2076 yzviu.exe 21 PID 2076 wrote to memory of 2180 2076 yzviu.exe 23 PID 2076 wrote to memory of 2180 2076 yzviu.exe 23 PID 2076 wrote to memory of 2180 2076 yzviu.exe 23 PID 2076 wrote to memory of 2180 2076 yzviu.exe 23 PID 2076 wrote to memory of 2180 2076 yzviu.exe 23 PID 2076 wrote to memory of 2820 2076 yzviu.exe 27 PID 2076 wrote to memory of 2820 2076 yzviu.exe 27 PID 2076 wrote to memory of 2820 2076 yzviu.exe 27 PID 2076 wrote to memory of 2820 2076 yzviu.exe 27 PID 2076 wrote to memory of 2820 2076 yzviu.exe 27 PID 2820 wrote to memory of 624 2820 c5ef238856b6f471f5cf047c2a55f741.exe 29 PID 2820 wrote to memory of 624 2820 c5ef238856b6f471f5cf047c2a55f741.exe 29 PID 2820 wrote to memory of 624 2820 c5ef238856b6f471f5cf047c2a55f741.exe 29 PID 2820 wrote to memory of 624 2820 c5ef238856b6f471f5cf047c2a55f741.exe 29 PID 2820 wrote to memory of 624 2820 c5ef238856b6f471f5cf047c2a55f741.exe 29 PID 2820 wrote to memory of 624 2820 c5ef238856b6f471f5cf047c2a55f741.exe 29 PID 2820 wrote to memory of 624 2820 c5ef238856b6f471f5cf047c2a55f741.exe 29 PID 2820 wrote to memory of 624 2820 c5ef238856b6f471f5cf047c2a55f741.exe 29 PID 2820 wrote to memory of 624 2820 c5ef238856b6f471f5cf047c2a55f741.exe 29 PID 624 wrote to memory of 1656 624 cmd.exe 31 PID 624 wrote to memory of 1656 624 cmd.exe 31 PID 624 wrote to memory of 1656 624 cmd.exe 31 PID 624 wrote to memory of 1656 624 cmd.exe 31 PID 2076 wrote to memory of 2000 2076 yzviu.exe 30 PID 2076 wrote to memory of 2000 2076 yzviu.exe 30 PID 2076 wrote to memory of 2000 2076 yzviu.exe 30 PID 2076 wrote to memory of 2000 2076 yzviu.exe 30 PID 2076 wrote to memory of 2000 2076 yzviu.exe 30 PID 2076 wrote to memory of 1656 2076 yzviu.exe 31 PID 2076 wrote to memory of 1656 2076 yzviu.exe 31 PID 2076 wrote to memory of 1656 2076 yzviu.exe 31 PID 2076 wrote to memory of 1656 2076 yzviu.exe 31 PID 2076 wrote to memory of 1656 2076 yzviu.exe 31 PID 1656 wrote to memory of 1596 1656 WerFault.exe 32 PID 1656 wrote to memory of 1596 1656 WerFault.exe 32 PID 1656 wrote to memory of 1596 1656 WerFault.exe 32 PID 1656 wrote to memory of 1596 1656 WerFault.exe 32 PID 2076 wrote to memory of 1164 2076 yzviu.exe 35 PID 2076 wrote to memory of 1164 2076 yzviu.exe 35 PID 2076 wrote to memory of 1164 2076 yzviu.exe 35 PID 2076 wrote to memory of 1164 2076 yzviu.exe 35 PID 2076 wrote to memory of 1164 2076 yzviu.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1256
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1352
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\c5ef238856b6f471f5cf047c2a55f741.exe"C:\Users\Admin\AppData\Local\Temp\c5ef238856b6f471f5cf047c2a55f741.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Roaming\Uzme\yzviu.exe"C:\Users\Admin\AppData\Roaming\Uzme\yzviu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2076
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpee652553.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 1164⤵
- Program crash
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 5365⤵
- Program crash
PID:1596
-
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2180
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1362174894997157891574212697-16711472821444878491113721282710795233611616196722"1⤵PID:2000
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366KB
MD5d14fa5e25364b5582dd16c5cb6602ea0
SHA1bc3811e60646b708214e9fd1ccce7d3bced4d787
SHA2567869c519c7edbd7821ed58f32e1d6d0f33690027508ffa4d1c7068f865bd29d4
SHA512f4350406eb1794d79b54b9ee6375dcd0bf16c37a351746cb0c52b830a5c94759e5e13f4e5b461888976d7a8f7be0886ac77d8c5fa8f8ba4303b92c07c3b07ca5