Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 13:06
Static task
static1
Behavioral task
behavioral1
Sample
7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe
Resource
win10v2004-20220812-en
General
-
Target
7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe
-
Size
291KB
-
MD5
719e9ac862ed0daf84d3b63caea86090
-
SHA1
40ecfacfec7565fc06a81b084032487d4b9af3cd
-
SHA256
7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325
-
SHA512
f1127766fe9bbf01235d4a8088ef47595413f509f4c9ec797e45162130552488d992c417fdf191dbdbd0b20d381114b8d0e1845d8cf43a97afbfade968616e25
-
SSDEEP
6144:S+yv3oO1yhEn/sA2/bgVPEid5pV7Ib8rINuDC75d1Y+VCV+UZ:wzn/sHoPJJ7VC75oc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1724 ufud.exe -
Deletes itself 1 IoCs
pid Process 824 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run ufud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ufud = "C:\\Users\\Admin\\AppData\\Roaming\\Owykix\\ufud.exe" ufud.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1976 set thread context of 824 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe 29 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe 1724 ufud.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1724 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe 28 PID 1976 wrote to memory of 1724 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe 28 PID 1976 wrote to memory of 1724 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe 28 PID 1976 wrote to memory of 1724 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe 28 PID 1724 wrote to memory of 1128 1724 ufud.exe 17 PID 1724 wrote to memory of 1128 1724 ufud.exe 17 PID 1724 wrote to memory of 1128 1724 ufud.exe 17 PID 1724 wrote to memory of 1128 1724 ufud.exe 17 PID 1724 wrote to memory of 1128 1724 ufud.exe 17 PID 1724 wrote to memory of 1192 1724 ufud.exe 16 PID 1724 wrote to memory of 1192 1724 ufud.exe 16 PID 1724 wrote to memory of 1192 1724 ufud.exe 16 PID 1724 wrote to memory of 1192 1724 ufud.exe 16 PID 1724 wrote to memory of 1192 1724 ufud.exe 16 PID 1724 wrote to memory of 1268 1724 ufud.exe 15 PID 1724 wrote to memory of 1268 1724 ufud.exe 15 PID 1724 wrote to memory of 1268 1724 ufud.exe 15 PID 1724 wrote to memory of 1268 1724 ufud.exe 15 PID 1724 wrote to memory of 1268 1724 ufud.exe 15 PID 1724 wrote to memory of 1976 1724 ufud.exe 20 PID 1724 wrote to memory of 1976 1724 ufud.exe 20 PID 1724 wrote to memory of 1976 1724 ufud.exe 20 PID 1724 wrote to memory of 1976 1724 ufud.exe 20 PID 1724 wrote to memory of 1976 1724 ufud.exe 20 PID 1976 wrote to memory of 824 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe 29 PID 1976 wrote to memory of 824 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe 29 PID 1976 wrote to memory of 824 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe 29 PID 1976 wrote to memory of 824 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe 29 PID 1976 wrote to memory of 824 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe 29 PID 1976 wrote to memory of 824 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe 29 PID 1976 wrote to memory of 824 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe 29 PID 1976 wrote to memory of 824 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe 29 PID 1976 wrote to memory of 824 1976 7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe"C:\Users\Admin\AppData\Local\Temp\7ac12ae32975fc07735005ae239312471e2cbc17fc0cebb502235b73d41d3325.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\Owykix\ufud.exe"C:\Users\Admin\AppData\Roaming\Owykix\ufud.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\PLJE0E9.bat"3⤵
- Deletes itself
PID:824
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD5479d31aad32feb1ce398c8ac0a37a111
SHA131d5ad776635a683af65bb7577a65b3634e709a1
SHA2569c3a86a9a5c64f7873b10ef543b14e5c732f42de84466d17d044b429c9d896d8
SHA512fcb57a6f432a1702f08c0a71b8a7a6b48a051571462d49eeb6bb71cae287ecbe7569c0d740678ef39c9957bb2283637bc03192af3a8508734bb5329b7bbbb1d2
-
Filesize
291KB
MD543a694101c8ac8ace3d52bae86dea1ef
SHA170113a1b4fd8fcb2c8aadeac378d15b388a5d211
SHA25667ee6c55c4ded92477d214b70be29baea4f116e986274cb3a0e8db6e58aae4d4
SHA512de136bd7cadadc05b8104f823e34ac4d2044254a5e30134009b49063ae8f23647ca518e63392c6b9805f4b62d0d83c13a051d389c7268042b2704a0b48bf39cc
-
Filesize
291KB
MD543a694101c8ac8ace3d52bae86dea1ef
SHA170113a1b4fd8fcb2c8aadeac378d15b388a5d211
SHA25667ee6c55c4ded92477d214b70be29baea4f116e986274cb3a0e8db6e58aae4d4
SHA512de136bd7cadadc05b8104f823e34ac4d2044254a5e30134009b49063ae8f23647ca518e63392c6b9805f4b62d0d83c13a051d389c7268042b2704a0b48bf39cc
-
Filesize
291KB
MD543a694101c8ac8ace3d52bae86dea1ef
SHA170113a1b4fd8fcb2c8aadeac378d15b388a5d211
SHA25667ee6c55c4ded92477d214b70be29baea4f116e986274cb3a0e8db6e58aae4d4
SHA512de136bd7cadadc05b8104f823e34ac4d2044254a5e30134009b49063ae8f23647ca518e63392c6b9805f4b62d0d83c13a051d389c7268042b2704a0b48bf39cc
-
Filesize
291KB
MD543a694101c8ac8ace3d52bae86dea1ef
SHA170113a1b4fd8fcb2c8aadeac378d15b388a5d211
SHA25667ee6c55c4ded92477d214b70be29baea4f116e986274cb3a0e8db6e58aae4d4
SHA512de136bd7cadadc05b8104f823e34ac4d2044254a5e30134009b49063ae8f23647ca518e63392c6b9805f4b62d0d83c13a051d389c7268042b2704a0b48bf39cc