Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
6ce6e0ef7ee8184931042f8f3fe634ac.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6ce6e0ef7ee8184931042f8f3fe634ac.exe
Resource
win10v2004-20240709-en
General
-
Target
6ce6e0ef7ee8184931042f8f3fe634ac.exe
-
Size
309KB
-
MD5
6ce6e0ef7ee8184931042f8f3fe634ac
-
SHA1
6a9667b88586a6cbcb22f271afa47f601744d1fb
-
SHA256
724d60add175b7d8d21541dd306cfcd1b737c756f19ca74220139e13f5256a06
-
SHA512
84d6044b4ba041b1db984ba1b2ea163edb2620c932a3295838d1adb50340e160e4e3d96a3bba4d9fff95044e668adf3e05aea360d51ff3762360fbdd24e7b70e
-
SSDEEP
6144:VwhzQ9Spr2I6jYZNp0H8vIz3YX5Sze2wpchpkUJ1HmBh4kHIJ:VrSn6jYQTKk9h1HmAJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1612 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2928 keew.exe -
Loads dropped DLL 2 IoCs
pid Process 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C4A05C48-6809-AD4F-9B76-1BFCA18838E1} = "C:\\Users\\Admin\\AppData\\Roaming\\Pyxii\\keew.exe" keew.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2308 set thread context of 1612 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ce6e0ef7ee8184931042f8f3fe634ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keew.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy 6ce6e0ef7ee8184931042f8f3fe634ac.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 6ce6e0ef7ee8184931042f8f3fe634ac.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe 2928 keew.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 2928 keew.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2928 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 30 PID 2308 wrote to memory of 2928 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 30 PID 2308 wrote to memory of 2928 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 30 PID 2308 wrote to memory of 2928 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 30 PID 2928 wrote to memory of 1124 2928 keew.exe 19 PID 2928 wrote to memory of 1124 2928 keew.exe 19 PID 2928 wrote to memory of 1124 2928 keew.exe 19 PID 2928 wrote to memory of 1124 2928 keew.exe 19 PID 2928 wrote to memory of 1124 2928 keew.exe 19 PID 2928 wrote to memory of 1176 2928 keew.exe 20 PID 2928 wrote to memory of 1176 2928 keew.exe 20 PID 2928 wrote to memory of 1176 2928 keew.exe 20 PID 2928 wrote to memory of 1176 2928 keew.exe 20 PID 2928 wrote to memory of 1176 2928 keew.exe 20 PID 2928 wrote to memory of 1236 2928 keew.exe 21 PID 2928 wrote to memory of 1236 2928 keew.exe 21 PID 2928 wrote to memory of 1236 2928 keew.exe 21 PID 2928 wrote to memory of 1236 2928 keew.exe 21 PID 2928 wrote to memory of 1236 2928 keew.exe 21 PID 2928 wrote to memory of 308 2928 keew.exe 23 PID 2928 wrote to memory of 308 2928 keew.exe 23 PID 2928 wrote to memory of 308 2928 keew.exe 23 PID 2928 wrote to memory of 308 2928 keew.exe 23 PID 2928 wrote to memory of 308 2928 keew.exe 23 PID 2928 wrote to memory of 2308 2928 keew.exe 29 PID 2928 wrote to memory of 2308 2928 keew.exe 29 PID 2928 wrote to memory of 2308 2928 keew.exe 29 PID 2928 wrote to memory of 2308 2928 keew.exe 29 PID 2928 wrote to memory of 2308 2928 keew.exe 29 PID 2308 wrote to memory of 1612 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 31 PID 2308 wrote to memory of 1612 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 31 PID 2308 wrote to memory of 1612 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 31 PID 2308 wrote to memory of 1612 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 31 PID 2308 wrote to memory of 1612 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 31 PID 2308 wrote to memory of 1612 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 31 PID 2308 wrote to memory of 1612 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 31 PID 2308 wrote to memory of 1612 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 31 PID 2308 wrote to memory of 1612 2308 6ce6e0ef7ee8184931042f8f3fe634ac.exe 31 PID 2928 wrote to memory of 2852 2928 keew.exe 34 PID 2928 wrote to memory of 2852 2928 keew.exe 34 PID 2928 wrote to memory of 2852 2928 keew.exe 34 PID 2928 wrote to memory of 2852 2928 keew.exe 34 PID 2928 wrote to memory of 2852 2928 keew.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\6ce6e0ef7ee8184931042f8f3fe634ac.exe"C:\Users\Admin\AppData\Local\Temp\6ce6e0ef7ee8184931042f8f3fe634ac.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Roaming\Pyxii\keew.exe"C:\Users\Admin\AppData\Roaming\Pyxii\keew.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2928
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp48dde784.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1612
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:308
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD5a2cb2fcdfb9410f0b540dd25363d896c
SHA162c9426124040abb9c006bfc06c96ebdac585405
SHA2560854610397d2f5225595e41babe1b546f87d798ea54678e6f629759c23dacd26
SHA5129d8a71c4d4f99025e4ef120b3e68e543a0449b555c1b962defa301d48bb7d2605a70234724955f5764587d44b530bdfd9ea8d53a80710ccd5cfb4b8e2f7b7228
-
Filesize
309KB
MD5e9f27c67b348f300f19fea0a83cfa984
SHA1afd6f7cded1f4909dd9ec18e94a7208587450c6a
SHA256c563dc4c3b5d913ec89d2a942f14134424ae975549e8b1710982942eeaeacd8b
SHA512494dff4a6291504be3270420fd591c0ab6f1ae2c33fcd523b6f03540fa74917e864b5267b9d89d26872975d6e6a69ced321d4668bb00d28d5021f5060d9f6010