Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7 -
submitted
19-07-2020 19:53
Static task
static1
Behavioral task
behavioral1
Sample
uncategorized_2.0.2.1.vir.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
uncategorized_2.0.2.1.vir.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
uncategorized_2.0.2.1.vir.exe
-
Size
129KB
-
MD5
b2dc0bf15f4334f8a6fa26a7b42cd371
-
SHA1
9718e1ce431f1a7e460d4e48c9ba9fd3bcf8e0f9
-
SHA256
5d29cc33d90b21321625dca2d097b4d5015b1f4ff955422ea0c51442ac27e1e3
-
SHA512
13cd5fddfd5acea0b194dc53d18e6f183edf4da105130f0183f13d3241dd07ebd54171b541340a71caec082bf2793ee64fb4f195cfad57def7d9a1540f6931a6
Score
8/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1048 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
codeq.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\Currentversion\Run codeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\{DD594046-1DB4-7EA4-CC1E-0A67702CBF8E} = "C:\\Users\\Admin\\AppData\\Roaming\\Gula\\codeq.exe" codeq.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
uncategorized_2.0.2.1.vir.exedescription pid process Token: SeSecurityPrivilege 112 uncategorized_2.0.2.1.vir.exe Token: SeSecurityPrivilege 112 uncategorized_2.0.2.1.vir.exe Token: SeSecurityPrivilege 112 uncategorized_2.0.2.1.vir.exe -
Loads dropped DLL 1 IoCs
Processes:
uncategorized_2.0.2.1.vir.exepid process 112 uncategorized_2.0.2.1.vir.exe -
Executes dropped EXE 1 IoCs
Processes:
codeq.exepid process 596 codeq.exe -
Processes:
uncategorized_2.0.2.1.vir.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Privacy uncategorized_2.0.2.1.vir.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" uncategorized_2.0.2.1.vir.exe -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
uncategorized_2.0.2.1.vir.execodeq.exedescription pid process target process PID 112 wrote to memory of 596 112 uncategorized_2.0.2.1.vir.exe codeq.exe PID 112 wrote to memory of 596 112 uncategorized_2.0.2.1.vir.exe codeq.exe PID 112 wrote to memory of 596 112 uncategorized_2.0.2.1.vir.exe codeq.exe PID 112 wrote to memory of 596 112 uncategorized_2.0.2.1.vir.exe codeq.exe PID 596 wrote to memory of 1180 596 codeq.exe taskhost.exe PID 596 wrote to memory of 1180 596 codeq.exe taskhost.exe PID 596 wrote to memory of 1180 596 codeq.exe taskhost.exe PID 596 wrote to memory of 1180 596 codeq.exe taskhost.exe PID 596 wrote to memory of 1180 596 codeq.exe taskhost.exe PID 596 wrote to memory of 1256 596 codeq.exe Dwm.exe PID 596 wrote to memory of 1256 596 codeq.exe Dwm.exe PID 596 wrote to memory of 1256 596 codeq.exe Dwm.exe PID 596 wrote to memory of 1256 596 codeq.exe Dwm.exe PID 596 wrote to memory of 1256 596 codeq.exe Dwm.exe PID 596 wrote to memory of 1300 596 codeq.exe Explorer.EXE PID 596 wrote to memory of 1300 596 codeq.exe Explorer.EXE PID 596 wrote to memory of 1300 596 codeq.exe Explorer.EXE PID 596 wrote to memory of 1300 596 codeq.exe Explorer.EXE PID 596 wrote to memory of 1300 596 codeq.exe Explorer.EXE PID 596 wrote to memory of 112 596 codeq.exe uncategorized_2.0.2.1.vir.exe PID 596 wrote to memory of 112 596 codeq.exe uncategorized_2.0.2.1.vir.exe PID 596 wrote to memory of 112 596 codeq.exe uncategorized_2.0.2.1.vir.exe PID 596 wrote to memory of 112 596 codeq.exe uncategorized_2.0.2.1.vir.exe PID 596 wrote to memory of 112 596 codeq.exe uncategorized_2.0.2.1.vir.exe PID 112 wrote to memory of 1048 112 uncategorized_2.0.2.1.vir.exe cmd.exe PID 112 wrote to memory of 1048 112 uncategorized_2.0.2.1.vir.exe cmd.exe PID 112 wrote to memory of 1048 112 uncategorized_2.0.2.1.vir.exe cmd.exe PID 112 wrote to memory of 1048 112 uncategorized_2.0.2.1.vir.exe cmd.exe PID 112 wrote to memory of 1048 112 uncategorized_2.0.2.1.vir.exe cmd.exe PID 112 wrote to memory of 1048 112 uncategorized_2.0.2.1.vir.exe cmd.exe PID 112 wrote to memory of 1048 112 uncategorized_2.0.2.1.vir.exe cmd.exe PID 112 wrote to memory of 1048 112 uncategorized_2.0.2.1.vir.exe cmd.exe PID 112 wrote to memory of 1048 112 uncategorized_2.0.2.1.vir.exe cmd.exe PID 596 wrote to memory of 1808 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1808 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1808 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1808 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1808 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1856 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1856 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1856 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1856 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1856 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1912 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1912 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1912 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1912 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1912 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1100 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1100 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1100 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1100 596 codeq.exe DllHost.exe PID 596 wrote to memory of 1100 596 codeq.exe DllHost.exe PID 596 wrote to memory of 268 596 codeq.exe DllHost.exe PID 596 wrote to memory of 268 596 codeq.exe DllHost.exe PID 596 wrote to memory of 268 596 codeq.exe DllHost.exe PID 596 wrote to memory of 268 596 codeq.exe DllHost.exe PID 596 wrote to memory of 268 596 codeq.exe DllHost.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
Processes:
codeq.exepid process 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe 596 codeq.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
uncategorized_2.0.2.1.vir.exedescription pid process target process PID 112 set thread context of 1048 112 uncategorized_2.0.2.1.vir.exe cmd.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\uncategorized_2.0.2.1.vir.exe"C:\Users\Admin\AppData\Local\Temp\uncategorized_2.0.2.1.vir.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Gula\codeq.exe"C:\Users\Admin\AppData\Roaming\Gula\codeq.exe"3⤵
- Adds Run key to start application
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp865f95f3.bat"3⤵
- Deletes itself
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp865f95f3.bat
-
C:\Users\Admin\AppData\Roaming\Gula\codeq.exe
-
C:\Users\Admin\AppData\Roaming\Gula\codeq.exe
-
C:\Users\Admin\AppData\Roaming\Wiod\byib.beu
-
\Users\Admin\AppData\Roaming\Gula\codeq.exe
-
memory/596-1-0x0000000000000000-mapping.dmp
-
memory/1048-4-0x0000000000050000-0x000000000006E000-memory.dmpFilesize
120KB
-
memory/1048-6-0x000000000005BE78-mapping.dmp