Analysis
-
max time kernel
122s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 10:32
Behavioral task
behavioral1
Sample
57c7b8f62896b63e90dc46cdb8aae2c10ae8f3fad8a637184805e0f36e668f39.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
57c7b8f62896b63e90dc46cdb8aae2c10ae8f3fad8a637184805e0f36e668f39.exe
Resource
win10v2004-20220812-en
General
-
Target
57c7b8f62896b63e90dc46cdb8aae2c10ae8f3fad8a637184805e0f36e668f39.exe
-
Size
205KB
-
MD5
7baab3ea37c9ecfdcc11bc8c8977047b
-
SHA1
2db4a3a40b0811f8af8087945ec670ab959725ca
-
SHA256
57c7b8f62896b63e90dc46cdb8aae2c10ae8f3fad8a637184805e0f36e668f39
-
SHA512
6f8304e4ba49f660d112329d5ef37e9cabf5e63f6c23bc7cd810b1c5d1669d96541617e9c58c0d3b9a64e854414c8fe999309993a9a8bf51f6ac3118cde65592
-
SSDEEP
6144:TTmgzw8RTPbC55dXcnuUWzULEQIBS+eZ2G:ug0OPE9/zWtcSlM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3544 Ugyqaa.exe -
resource yara_rule behavioral2/memory/4248-132-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral2/files/0x0006000000022e6f-137.dat upx behavioral2/files/0x0006000000022e6f-138.dat upx behavioral2/memory/3544-139-0x0000000000400000-0x0000000000470000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Ugyqaa.exe 57c7b8f62896b63e90dc46cdb8aae2c10ae8f3fad8a637184805e0f36e668f39.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Ugyqaa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Ugyqaa.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 57c7b8f62896b63e90dc46cdb8aae2c10ae8f3fad8a637184805e0f36e668f39.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 57c7b8f62896b63e90dc46cdb8aae2c10ae8f3fad8a637184805e0f36e668f39.exe File created C:\Windows\Ugyqaa.exe 57c7b8f62896b63e90dc46cdb8aae2c10ae8f3fad8a637184805e0f36e668f39.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4952 3544 WerFault.exe 82 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main Ugyqaa.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe 3544 Ugyqaa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4248 wrote to memory of 3544 4248 57c7b8f62896b63e90dc46cdb8aae2c10ae8f3fad8a637184805e0f36e668f39.exe 82 PID 4248 wrote to memory of 3544 4248 57c7b8f62896b63e90dc46cdb8aae2c10ae8f3fad8a637184805e0f36e668f39.exe 82 PID 4248 wrote to memory of 3544 4248 57c7b8f62896b63e90dc46cdb8aae2c10ae8f3fad8a637184805e0f36e668f39.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\57c7b8f62896b63e90dc46cdb8aae2c10ae8f3fad8a637184805e0f36e668f39.exe"C:\Users\Admin\AppData\Local\Temp\57c7b8f62896b63e90dc46cdb8aae2c10ae8f3fad8a637184805e0f36e668f39.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\Ugyqaa.exeC:\Windows\Ugyqaa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:3544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 7323⤵
- Program crash
PID:4952
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3544 -ip 35441⤵PID:8
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426B
MD5ab952a481db5f4f2bc3f04cf1df256c7
SHA188ab8b1246dfa3c056e2e544ada43d534ccc0e00
SHA256f23729d20f7ccc9a12079343e68f11120247da83ac6ec466e1d7867717fe3a2f
SHA512713d4f9f1f1f30e924664f1bece36e812f9c555eb07fe29aaced7d7b7d86a04ca62409ec88d6f4d58e536f4df7a93a48d310b29d8f187cc8ebd9f5d020561a51
-
Filesize
205KB
MD57baab3ea37c9ecfdcc11bc8c8977047b
SHA12db4a3a40b0811f8af8087945ec670ab959725ca
SHA25657c7b8f62896b63e90dc46cdb8aae2c10ae8f3fad8a637184805e0f36e668f39
SHA5126f8304e4ba49f660d112329d5ef37e9cabf5e63f6c23bc7cd810b1c5d1669d96541617e9c58c0d3b9a64e854414c8fe999309993a9a8bf51f6ac3118cde65592
-
Filesize
205KB
MD57baab3ea37c9ecfdcc11bc8c8977047b
SHA12db4a3a40b0811f8af8087945ec670ab959725ca
SHA25657c7b8f62896b63e90dc46cdb8aae2c10ae8f3fad8a637184805e0f36e668f39
SHA5126f8304e4ba49f660d112329d5ef37e9cabf5e63f6c23bc7cd810b1c5d1669d96541617e9c58c0d3b9a64e854414c8fe999309993a9a8bf51f6ac3118cde65592