Analysis
-
max time kernel
130s -
max time network
156s -
platform
windows7_x64 -
resource
win7 -
submitted
08/07/2020, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
UD_PO_000681.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
UD_PO_000681.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
UD_PO_000681.exe
-
Size
483KB
-
MD5
24a8d8c071bbb496ba8e64e7817fd6c9
-
SHA1
f40194270a9475aeb044a062bd7ef9376d8ed857
-
SHA256
c890bc2e899bdb9c2a7cbe9ab52b852c5ea6832e44615f2afc66ab47925866d2
-
SHA512
c4dcbb0b0fdc7469c6e5abc038867f3c65e179a3692dc884d7713db20c2fdefb4f96d5369210aedf807008cbe3821b05fb2a162c45a603aa0c68d56962d4e9a0
Score
8/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1612 UD_PO_000681.exe 1612 UD_PO_000681.exe 1612 UD_PO_000681.exe 1860 asnsn.exe 1860 asnsn.exe 1860 asnsn.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1540 1612 UD_PO_000681.exe 24 PID 1612 wrote to memory of 1540 1612 UD_PO_000681.exe 24 PID 1612 wrote to memory of 1540 1612 UD_PO_000681.exe 24 PID 1612 wrote to memory of 1540 1612 UD_PO_000681.exe 24 PID 1540 wrote to memory of 1716 1540 cmd.exe 26 PID 1540 wrote to memory of 1716 1540 cmd.exe 26 PID 1540 wrote to memory of 1716 1540 cmd.exe 26 PID 1540 wrote to memory of 1716 1540 cmd.exe 26 PID 1612 wrote to memory of 1860 1612 UD_PO_000681.exe 27 PID 1612 wrote to memory of 1860 1612 UD_PO_000681.exe 27 PID 1612 wrote to memory of 1860 1612 UD_PO_000681.exe 27 PID 1612 wrote to memory of 1860 1612 UD_PO_000681.exe 27 PID 1860 wrote to memory of 1928 1860 asnsn.exe 28 PID 1860 wrote to memory of 1928 1860 asnsn.exe 28 PID 1860 wrote to memory of 1928 1860 asnsn.exe 28 PID 1860 wrote to memory of 1928 1860 asnsn.exe 28 PID 1860 wrote to memory of 1928 1860 asnsn.exe 28 PID 1860 wrote to memory of 1928 1860 asnsn.exe 28 PID 1860 wrote to memory of 1928 1860 asnsn.exe 28 PID 1860 wrote to memory of 1928 1860 asnsn.exe 28 PID 1860 wrote to memory of 1928 1860 asnsn.exe 28 -
Loads dropped DLL 2 IoCs
pid Process 1612 UD_PO_000681.exe 1860 asnsn.exe -
Executes dropped EXE 2 IoCs
pid Process 1860 asnsn.exe 1928 AddInProcess32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1860 set thread context of 1928 1860 asnsn.exe 28 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\dnfnf = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\asnsn.exe" reg.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1612 UD_PO_000681.exe Token: SeDebugPrivilege 1860 asnsn.exe Token: SeDebugPrivilege 1928 AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UD_PO_000681.exe"C:\Users\Admin\AppData\Local\Temp\UD_PO_000681.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v dnfnf /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\asnsn.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v dnfnf /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\asnsn.exe"3⤵
- Adds Run entry to start application
PID:1716
-
-
-
C:\Users\Admin\AppData\Roaming\asnsn.exe"C:\Users\Admin\AppData\Roaming\asnsn.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-