Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe
Resource
win10v2004-20240419-en
General
-
Target
d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe
-
Size
448KB
-
MD5
db2c95b84c57c44a8a8592c1f6cdcc38
-
SHA1
8f9216cf99f6393ceca693e5d69fd88d54e9cb41
-
SHA256
d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183
-
SHA512
7d1b03044e9661686953f869376b1c54a68a6476a911a865107a626cd7a2db1044ee0404138a8ffed614469c472c1bff0a0dfc09d1c58ef79704f8f3929d4f38
-
SSDEEP
6144:yDdxaOjFS7pQAnluY4Mzw5ykEjiPISUOgW9X+hOGzC/NM:UKq+SAlu0k5ykmZzcukG2/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2604 CSYEVOI.exe -
Loads dropped DLL 2 IoCs
pid Process 3036 cmd.exe 3036 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\system\CSYEVOI.exe d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe File opened for modification C:\windows\system\CSYEVOI.exe d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe File created C:\windows\system\CSYEVOI.exe.bat d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2396 d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe 2604 CSYEVOI.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2396 d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe 2396 d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe 2604 CSYEVOI.exe 2604 CSYEVOI.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2396 wrote to memory of 3036 2396 d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe 28 PID 2396 wrote to memory of 3036 2396 d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe 28 PID 2396 wrote to memory of 3036 2396 d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe 28 PID 2396 wrote to memory of 3036 2396 d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe 28 PID 3036 wrote to memory of 2604 3036 cmd.exe 30 PID 3036 wrote to memory of 2604 3036 cmd.exe 30 PID 3036 wrote to memory of 2604 3036 cmd.exe 30 PID 3036 wrote to memory of 2604 3036 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe"C:\Users\Admin\AppData\Local\Temp\d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\system\CSYEVOI.exe.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\windows\system\CSYEVOI.exeC:\windows\system\CSYEVOI.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD57af1f138b6bc1e713bf1c9bb5f87fbd6
SHA118618a7a6a39772eba6b3ec73f4f632ab5edcc74
SHA25624aaeb3bc332fa25bb53acce67c4f81758e5f6c65b8492c7557731e779da764f
SHA512c19bfbd72cf4059e21775be6461777fc919c0246f3c192cac170f260ca5de43a1ab6f9c6d9ff827dc6df1ea7384e280971c5fdb745319ebfe203e816d7837886
-
Filesize
448KB
MD525099482ab55fb6097f8c60e705c206d
SHA173b47318a9a807552f4504bbef6854cae0acc69e
SHA256585f92d67834fede64f2af589789bd811bb8757bc1c32113178fb40a84501bab
SHA5128acf2b251ed194b01739cf2edb3fc85af9f81e90223348f58276326dfae6115695838e08e80bf7694a95c1abb70bc3cfc871d4025e82edccaad95944feb38639