Analysis
-
max time kernel
151s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 15:03
Static task
static1
Behavioral task
behavioral1
Sample
18183b756caf26a960e906479ee989da217e49b69ecf564624368194137f1f9b.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
18183b756caf26a960e906479ee989da217e49b69ecf564624368194137f1f9b.dll
Resource
win10v2004-20220414-en
General
-
Target
18183b756caf26a960e906479ee989da217e49b69ecf564624368194137f1f9b.dll
-
Size
1.1MB
-
MD5
886b43a327447cece77a27f03eea3c94
-
SHA1
0c459a4196f6fd0d7bf68ad339f75ce081a374f3
-
SHA256
18183b756caf26a960e906479ee989da217e49b69ecf564624368194137f1f9b
-
SHA512
a59d269f9a1d66e63e1b4ffcbf89767a73032011820bf0bf3a911505efd8b04bf4c47d2640a9858a95ab05fdb6922939e0b9806e23d281fdd241593d978cf30d
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Utilman.exeSystemPropertiesHardware.exeRecoveryDrive.exepid process 4608 Utilman.exe 3812 SystemPropertiesHardware.exe 4996 RecoveryDrive.exe -
Loads dropped DLL 3 IoCs
Processes:
Utilman.exeSystemPropertiesHardware.exeRecoveryDrive.exepid process 4608 Utilman.exe 3812 SystemPropertiesHardware.exe 4996 RecoveryDrive.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Erihzxqqayujs = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\X1l\\SYSTEM~1.EXE" -
Processes:
Utilman.exeSystemPropertiesHardware.exeRecoveryDrive.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utilman.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesHardware.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RecoveryDrive.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3580 rundll32.exe 3580 rundll32.exe 3580 rundll32.exe 3580 rundll32.exe 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 2896 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2896 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2896 wrote to memory of 4520 2896 Utilman.exe PID 2896 wrote to memory of 4520 2896 Utilman.exe PID 2896 wrote to memory of 4608 2896 Utilman.exe PID 2896 wrote to memory of 4608 2896 Utilman.exe PID 2896 wrote to memory of 3744 2896 SystemPropertiesHardware.exe PID 2896 wrote to memory of 3744 2896 SystemPropertiesHardware.exe PID 2896 wrote to memory of 3812 2896 SystemPropertiesHardware.exe PID 2896 wrote to memory of 3812 2896 SystemPropertiesHardware.exe PID 2896 wrote to memory of 3684 2896 RecoveryDrive.exe PID 2896 wrote to memory of 3684 2896 RecoveryDrive.exe PID 2896 wrote to memory of 4996 2896 RecoveryDrive.exe PID 2896 wrote to memory of 4996 2896 RecoveryDrive.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18183b756caf26a960e906479ee989da217e49b69ecf564624368194137f1f9b.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\Utilman.exeC:\Windows\system32\Utilman.exe1⤵
-
C:\Users\Admin\AppData\Local\HyCzn\Utilman.exeC:\Users\Admin\AppData\Local\HyCzn\Utilman.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesHardware.exeC:\Windows\system32\SystemPropertiesHardware.exe1⤵
-
C:\Users\Admin\AppData\Local\EMDrY\SystemPropertiesHardware.exeC:\Users\Admin\AppData\Local\EMDrY\SystemPropertiesHardware.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\RecoveryDrive.exeC:\Windows\system32\RecoveryDrive.exe1⤵
-
C:\Users\Admin\AppData\Local\95A\RecoveryDrive.exeC:\Users\Admin\AppData\Local\95A\RecoveryDrive.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\95A\ReAgent.dllFilesize
1.1MB
MD50d05e8a9d7343dfa33ad150abb962358
SHA132f09efd9bf81da7927349d620e73ad5fcf05387
SHA2569075628c4404f7fc4d5f29de2de591e5746163a7242a1e44def2f031fcfb69f7
SHA5127a3b38dba8539b862edfdbb5e756f5ef1ce6ec005c3c91f877aa414c0185a2f67d3dd88188af2e82665da581133bc2fed3f5c3a109de290f3f5a65e1233a4937
-
C:\Users\Admin\AppData\Local\95A\ReAgent.dllFilesize
1.1MB
MD50d05e8a9d7343dfa33ad150abb962358
SHA132f09efd9bf81da7927349d620e73ad5fcf05387
SHA2569075628c4404f7fc4d5f29de2de591e5746163a7242a1e44def2f031fcfb69f7
SHA5127a3b38dba8539b862edfdbb5e756f5ef1ce6ec005c3c91f877aa414c0185a2f67d3dd88188af2e82665da581133bc2fed3f5c3a109de290f3f5a65e1233a4937
-
C:\Users\Admin\AppData\Local\95A\RecoveryDrive.exeFilesize
911KB
MD5b9b3dc6f2eb89e41ff27400952602c74
SHA124ae07e0db3ace0809d08bbd039db3a9d533e81b
SHA256630518cb2e4636f889d12c98fb2e6be4e579c5eeb86f88695d3f7fff3f5515c4
SHA5127906954b881f1051a0c7f098e096bc28eddcc48643b8bf3134dd57b8c18d8beba4f9a0ac5d348de2f9b8ea607c3e9cb0e61d91e4f3ba1fefb02839f928e3e3fe
-
C:\Users\Admin\AppData\Local\EMDrY\SYSDM.CPLFilesize
1.1MB
MD50ec4a3f810eaad827dfba8a15442ac55
SHA1eaf43f3ca19a995c23f5cf84f3009a621883674e
SHA256a42b0e2b9c6ad351c7569769f58953b538de81d72752f53822956f5628c5353a
SHA512bdd7e2c10c51f62d8161acefee708de7e50853635414fd531d7cfeaead0d56667ecd71c56d68346154ad4089671b498a98f9b5d634cee30eb62392b0d7676927
-
C:\Users\Admin\AppData\Local\EMDrY\SYSDM.CPLFilesize
1.1MB
MD50ec4a3f810eaad827dfba8a15442ac55
SHA1eaf43f3ca19a995c23f5cf84f3009a621883674e
SHA256a42b0e2b9c6ad351c7569769f58953b538de81d72752f53822956f5628c5353a
SHA512bdd7e2c10c51f62d8161acefee708de7e50853635414fd531d7cfeaead0d56667ecd71c56d68346154ad4089671b498a98f9b5d634cee30eb62392b0d7676927
-
C:\Users\Admin\AppData\Local\EMDrY\SystemPropertiesHardware.exeFilesize
82KB
MD5bf5bc0d70a936890d38d2510ee07a2cd
SHA169d5971fd264d8128f5633db9003afef5fad8f10
SHA256c8ebd920399ebcf3ab72bd325b71a6b4c6119dfecea03f25059a920c4d32acc7
SHA5120e129044777cbbf5ea995715159c50773c1818fc5e8faa5c827fd631b44c086b34dfdcbe174b105891ccc3882cc63a8664d189fb6a631d8f589de4e01a862f51
-
C:\Users\Admin\AppData\Local\HyCzn\OLEACC.dllFilesize
1.1MB
MD58ad47fa2d28344ca0d619d28555c2edd
SHA1708f517c974bc90393e768b0b2720443c3f5a0fb
SHA256270f5eb3ff091efca5e3aa5aaa8c2b7f21e34e3abf3b1113109280f33a94e333
SHA512b80ef6c5fff21969fca68b65c9da75746b29e8619c757bb5858885a89ecf053691fdc3f50ca0379a0c1ab7fd646faecabb01f779b7403ba911151315cc8b2fe5
-
C:\Users\Admin\AppData\Local\HyCzn\OLEACC.dllFilesize
1.1MB
MD58ad47fa2d28344ca0d619d28555c2edd
SHA1708f517c974bc90393e768b0b2720443c3f5a0fb
SHA256270f5eb3ff091efca5e3aa5aaa8c2b7f21e34e3abf3b1113109280f33a94e333
SHA512b80ef6c5fff21969fca68b65c9da75746b29e8619c757bb5858885a89ecf053691fdc3f50ca0379a0c1ab7fd646faecabb01f779b7403ba911151315cc8b2fe5
-
C:\Users\Admin\AppData\Local\HyCzn\Utilman.exeFilesize
123KB
MD5a117edc0e74ab4770acf7f7e86e573f7
SHA15ceffb1a5e05e52aafcbc2d44e1e8445440706f3
SHA256b5bc4fce58403ea554691db678e6c8c448310fe59990990f0e37cd4357567d37
SHA51272883f794ff585fe7e86e818d4d8c54fa9781cab6c3fac6f6956f58a016a91f676e70d14691cbe054ae7b7469c6b4783152fbb694e92b940d9e3595fe3f41d97
-
memory/2896-136-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/2896-135-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/2896-138-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/2896-142-0x00007FFEE34D0000-0x00007FFEE34E0000-memory.dmpFilesize
64KB
-
memory/2896-132-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/2896-140-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/2896-139-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/2896-137-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/2896-133-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/2896-130-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/2896-141-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/2896-131-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/2896-134-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/3812-147-0x0000000000000000-mapping.dmp
-
memory/4608-143-0x0000000000000000-mapping.dmp
-
memory/4996-151-0x0000000000000000-mapping.dmp