Analysis
-
max time kernel
108s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 12:06
Static task
static1
Behavioral task
behavioral1
Sample
800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe
Resource
win10v2004-20220812-en
General
-
Target
800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe
-
Size
238KB
-
MD5
0d409704c91e5deacf223171ac151ecf
-
SHA1
b73e480140f12569ab4e711fab9373a9abd2997d
-
SHA256
800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c
-
SHA512
18300f35da339d0651740ff6d94d517bd6d18cc583b3a835078019a76841d93d084e9df193f10380e0f5eff0ffef391ea341416abba57c4d61f834ad47a47be0
-
SSDEEP
6144:JP8Xqjo+np9KpsXmOo0pfqXwL0EL30+EpsPq8mFqjwGOlsM6/:JPKOHn3j/+wjVPnYusi/
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1108 ukg.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/memory/1560-57-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/1560-62-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/1108-66-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/1108-68-0x0000000000400000-0x00000000004E0000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1108 ukg.exe -
Loads dropped DLL 2 IoCs
pid Process 1560 800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe 1560 800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1560 800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe 1560 800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe 1560 800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe 1560 800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe 1560 800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe 1560 800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe 1560 800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe 1560 800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1044 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: 33 1820 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1820 AUDIODG.EXE Token: 33 1820 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1820 AUDIODG.EXE Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1560 wrote to memory of 1108 1560 800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe 28 PID 1560 wrote to memory of 1108 1560 800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe 28 PID 1560 wrote to memory of 1108 1560 800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe 28 PID 1560 wrote to memory of 1108 1560 800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe"C:\Users\Admin\AppData\Local\Temp\800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\ukg.exe"C:\Users\Admin\AppData\Local\ukg.exe" -gav C:\Users\Admin\AppData\Local\Temp\800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c.exe2⤵
- Executes dropped EXE
- Deletes itself
PID:1108
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1044
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5601⤵
- Suspicious use of AdjustPrivilegeToken
PID:1820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD50d409704c91e5deacf223171ac151ecf
SHA1b73e480140f12569ab4e711fab9373a9abd2997d
SHA256800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c
SHA51218300f35da339d0651740ff6d94d517bd6d18cc583b3a835078019a76841d93d084e9df193f10380e0f5eff0ffef391ea341416abba57c4d61f834ad47a47be0
-
Filesize
238KB
MD50d409704c91e5deacf223171ac151ecf
SHA1b73e480140f12569ab4e711fab9373a9abd2997d
SHA256800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c
SHA51218300f35da339d0651740ff6d94d517bd6d18cc583b3a835078019a76841d93d084e9df193f10380e0f5eff0ffef391ea341416abba57c4d61f834ad47a47be0
-
Filesize
238KB
MD50d409704c91e5deacf223171ac151ecf
SHA1b73e480140f12569ab4e711fab9373a9abd2997d
SHA256800e3ee3577ab68f8e14a6b9498cc66e2fc7107e22568e7f8c501a2af2f0504c
SHA51218300f35da339d0651740ff6d94d517bd6d18cc583b3a835078019a76841d93d084e9df193f10380e0f5eff0ffef391ea341416abba57c4d61f834ad47a47be0