Analysis
-
max time kernel
102s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
294e44993a7c4009e5fb5590df6ae677fccf045a86af1fbeb1494410f626d164.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
294e44993a7c4009e5fb5590df6ae677fccf045a86af1fbeb1494410f626d164.exe
Resource
win10v2004-20220901-en
General
-
Target
294e44993a7c4009e5fb5590df6ae677fccf045a86af1fbeb1494410f626d164.exe
-
Size
192KB
-
MD5
6bb975f1e0ae62288085df9a9bbbfdc0
-
SHA1
0352d733871988df9daf4710eb7bbf90dc146d53
-
SHA256
294e44993a7c4009e5fb5590df6ae677fccf045a86af1fbeb1494410f626d164
-
SHA512
acdaed1412ac702183bb7e60196807f925fcebd053d5b71d95029f7f42d61062c8f80139ce79f21ace1f7d811edb64c4bf469bd10be49c5e52ce80de91bee6ea
-
SSDEEP
3072:HhJoS8kLZJSn8WO+SbtOWQLWF42yIr85rKjkjv/ATsuZfl:HfoPwtOWQIbkjv/AwuZ9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4216 uyhrqo.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node uyhrqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\muyhr uyhrqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\shell\\muyhr uyhrqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell uyhrqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID uyhrqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} uyhrqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\\shell\\muyhr\\command uyhrqo.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1748 PING.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2168 wrote to memory of 5088 2168 294e44993a7c4009e5fb5590df6ae677fccf045a86af1fbeb1494410f626d164.exe 84 PID 2168 wrote to memory of 5088 2168 294e44993a7c4009e5fb5590df6ae677fccf045a86af1fbeb1494410f626d164.exe 84 PID 2168 wrote to memory of 5088 2168 294e44993a7c4009e5fb5590df6ae677fccf045a86af1fbeb1494410f626d164.exe 84 PID 5088 wrote to memory of 4216 5088 cmd.exe 87 PID 5088 wrote to memory of 4216 5088 cmd.exe 87 PID 5088 wrote to memory of 4216 5088 cmd.exe 87 PID 5088 wrote to memory of 1748 5088 cmd.exe 88 PID 5088 wrote to memory of 1748 5088 cmd.exe 88 PID 5088 wrote to memory of 1748 5088 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\294e44993a7c4009e5fb5590df6ae677fccf045a86af1fbeb1494410f626d164.exe"C:\Users\Admin\AppData\Local\Temp\294e44993a7c4009e5fb5590df6ae677fccf045a86af1fbeb1494410f626d164.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\tsiikpt.bat2⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\uyhrqo.exe"C:\Users\Admin\AppData\Local\Temp\uyhrqo.exe"3⤵
- Executes dropped EXE
- Modifies registry class
PID:4216
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1748
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD585f9b658ba8550eade5df42e6f075e39
SHA13a6b0963e8f5e7ed43fe32b7dd23fd707f85ba67
SHA2561c0632988bf159a870e40ae9a96e4da89484f5e6f12f4777ba110f2901adfd31
SHA51221f71023845fa49390cfb2f778a493f45ff53aa0e4c9f51db983abdc1d2613b68a6ee3564329cac04ae2b7d68f208b3137d17bd4185cca384c3bdf7d98372381
-
Filesize
188B
MD593d52cd571869fbb8b99cafd65af4f70
SHA1e80c6dbf305beff852c41d43a5a16672776d5326
SHA25609ba715429ed41d9152bd043cdbdbed6db3fcd932fa1211c87c2ea306d22d48a
SHA512366a6a9e6dee2fcd3f646db39757d97fafc6912b6a644a85e3f6b3c6238e88c0b0ff1d1357b06e7cecf45b8ce3f183e9980b0957cc1c85a16a0bf55f401f1ac1
-
Filesize
144KB
MD5cafbd7e832d31e6279f9ceb8c60ea14e
SHA17a241901846468052bba26d1234b231cd855da44
SHA256c3d9abd59326e6e3a785db4948bc7967b16df46ae74fe4aef97a72b26383f60f
SHA51255881fbd0c36144060d107610ced6e5dc431af73f44adcbf7fb0006eb56973869315706723ba969c83132fb9d04595cdd08847acef02dbfd99084d8a8161d861
-
Filesize
144KB
MD5cafbd7e832d31e6279f9ceb8c60ea14e
SHA17a241901846468052bba26d1234b231cd855da44
SHA256c3d9abd59326e6e3a785db4948bc7967b16df46ae74fe4aef97a72b26383f60f
SHA51255881fbd0c36144060d107610ced6e5dc431af73f44adcbf7fb0006eb56973869315706723ba969c83132fb9d04595cdd08847acef02dbfd99084d8a8161d861