Resubmissions
18-04-2021 01:04
210418-l61gq8jtsa 818-04-2021 01:01
210418-y7pbs19h3j 807-04-2021 00:47
210407-dyc6ed67ws 807-04-2021 00:43
210407-2h6x9trgc2 8Analysis
-
max time kernel
150s -
max time network
91s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
07-04-2021 00:47
Static task
static1
Behavioral task
behavioral1
Sample
2020_21_S2_A2.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
2020_21_S2_A2.exe
Resource
win10v20201028
General
-
Target
2020_21_S2_A2.exe
-
Size
75KB
-
MD5
603638e373770eab32b41fac447754e8
-
SHA1
fcec650c8784dfeb08e868c08be347f9d4d9a53b
-
SHA256
5fd9a8605221ee520a11865a5b07c9b37c894acb8e38a2965fb3f31d02bdeedc
-
SHA512
d83d7062aedb4eb77642aa91fb20c7159e403b87ea6de9c2487bec3739f2eac1dc86d40debca66cb9d93a71d43cd0869c2efbe7cf28deae9634add6387d3234b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
UWLGOLWN.exepid process 884 UWLGOLWN.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
UWLGOLWN.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Update = "C:\\UWLGOLWN.exe" UWLGOLWN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2020_21_S2_A2.exedescription pid process target process PID 892 wrote to memory of 884 892 2020_21_S2_A2.exe UWLGOLWN.exe PID 892 wrote to memory of 884 892 2020_21_S2_A2.exe UWLGOLWN.exe PID 892 wrote to memory of 884 892 2020_21_S2_A2.exe UWLGOLWN.exe PID 892 wrote to memory of 884 892 2020_21_S2_A2.exe UWLGOLWN.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
603638e373770eab32b41fac447754e8
SHA1fcec650c8784dfeb08e868c08be347f9d4d9a53b
SHA2565fd9a8605221ee520a11865a5b07c9b37c894acb8e38a2965fb3f31d02bdeedc
SHA512d83d7062aedb4eb77642aa91fb20c7159e403b87ea6de9c2487bec3739f2eac1dc86d40debca66cb9d93a71d43cd0869c2efbe7cf28deae9634add6387d3234b