Analysis

  • max time kernel
    5s
  • max time network
    1s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 17:52

General

  • Target

    assasin terror.exe

  • Size

    456KB

  • MD5

    b46ee2dfaa9ff0d313f2961dfed817de

  • SHA1

    f0cc165c55eb0cefc228ef74546f2af7bf046dd5

  • SHA256

    a10701e1ca478e967fe767382a33025aef1183259e0d1aff990f5f9b34335fb6

  • SHA512

    8fe28ea982f48e9d79a0c06b9c17ad0a350c594115bc88a65456feae50b261e196bd886d703e7b4cada1588b205d93492502c3632bba898bb5e2909f5ecfc829

  • SSDEEP

    12288:HpUJ3r6YkVwJgNnSykgb9cqWnw4q6ZmFhqse:HpUNr6YkVRFkgbeqeo68Fhq/

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • Pykspa

    Pykspa is a worm spreads via Skype uses DGA and it's written in C++.

  • Pykspa family
  • UAC bypass 3 TTPs 6 IoCs
  • Detect Pykspa worm 2 IoCs
  • Adds policy Run key to start application 2 TTPs 9 IoCs
  • Disables RegEdit via registry modification 5 IoCs
  • Executes dropped EXE 3 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 1 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Drops file in System32 directory 25 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 25 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\assasin terror.exe
    "C:\Users\Admin\AppData\Local\Temp\assasin terror.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\cxtzfhhamhd.exe
      "C:\Users\Admin\AppData\Local\Temp\cxtzfhhamhd.exe" "c:\users\admin\appdata\local\temp\assasin terror.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1700
      • C:\Users\Admin\AppData\Local\Temp\guxcgm.exe
        "C:\Users\Admin\AppData\Local\Temp\guxcgm.exe" "-C:\Users\Admin\AppData\Local\Temp\sqdsgwrhwhllmxip.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Impair Defenses: Safe Mode Boot
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:2860
      • C:\Users\Admin\AppData\Local\Temp\guxcgm.exe
        "C:\Users\Admin\AppData\Local\Temp\guxcgm.exe" "-C:\Users\Admin\AppData\Local\Temp\sqdsgwrhwhllmxip.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\cxtzfhhamhd.exe

    Filesize

    320KB

    MD5

    b3bdef94f94e8ff4e050f028004eb0de

    SHA1

    2ba7161ffaa14ce8ed270e12cdfbebd55cbee4a7

    SHA256

    3675695291696ca22973fa3f1795d3bf61be5e414a461bd734fdbc52abd72e56

    SHA512

    b1149d0124d9f4cdd436cdcd0309ae12b68b394ebfe0eeff321619a036ae6a13543679ea6683c4a0367e6b71edb16f68f68220f54c5cbde3a5bbbec7142c117c

  • C:\Users\Admin\AppData\Local\ngoyhsitdjidzflnngdweoxiyjtzytpvb.dwt

    Filesize

    4KB

    MD5

    38aaf86210318a8831250ebdc1f0f6f7

    SHA1

    4861f7165783fde665b892c001420905163f4f30

    SHA256

    6f23250f83b07f78ad8a1058fc39015840716f425200d4ee300a126249962035

    SHA512

    40023a5175edd751b6b88fe37e12548b8efd7e70c1bfc7ff597a9f74aa526c45e8df7cb6ab2eeb8a6493321846c6f54f8d61eb655cf9e6b300aed2bd75ae4b57

  • C:\Users\Admin\AppData\Local\webayyddcxlvgbwnckweba.ydd

    Filesize

    280B

    MD5

    3fd74b3f4c8129de2f1d3e34e23e8244

    SHA1

    d701b2501e5cf7f3b1257f9de8e10d8ea5966349

    SHA256

    3c344a39fa3934aa19e25f576013e8ba469853386ba7f0dfe0709d73db62ef4f

    SHA512

    0201691b2be194784dc9f54b955ec5c59b6adbc367f42e6307678b9f92db72c2c206f8cb48c58684b654b1277f1e93be17d3dbae0ac0d77b9adbb678ce5d3ae6

  • C:\Windows\SysWOW64\iixoewtlcpvxanajqq.exe

    Filesize

    456KB

    MD5

    b46ee2dfaa9ff0d313f2961dfed817de

    SHA1

    f0cc165c55eb0cefc228ef74546f2af7bf046dd5

    SHA256

    a10701e1ca478e967fe767382a33025aef1183259e0d1aff990f5f9b34335fb6

    SHA512

    8fe28ea982f48e9d79a0c06b9c17ad0a350c594115bc88a65456feae50b261e196bd886d703e7b4cada1588b205d93492502c3632bba898bb5e2909f5ecfc829

  • \Users\Admin\AppData\Local\Temp\guxcgm.exe

    Filesize

    720KB

    MD5

    3be07f33e7327012c027e1905df560c8

    SHA1

    c3a765c1293e0f6d885ce98de649ad99cd00b9be

    SHA256

    11c536747af019a14cdf61d2bbbbd9c42458dccbee30f821f4ada7ea42765743

    SHA512

    eda460e0bd6f8fa13199ff2174fa95c94f86234eb29fcdc5df22e7e6ee79ec8809d5eb208da6cc0c3f94ef777f89c1a9c06370155204cf1765c71889708356f3