Analysis
-
max time kernel
151s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 13:29
Static task
static1
Behavioral task
behavioral1
Sample
410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe
Resource
win10v2004-20220812-en
General
-
Target
410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe
-
Size
87KB
-
MD5
057cf84ddf34c10a3d5d6ad2c7756783
-
SHA1
316fe59833cbf1afd7d615f0777b03756a7c548a
-
SHA256
410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9
-
SHA512
4dedc6c45d19a1799319bd81fd7c1a69a761a36696ff569da3930eee1eed51c3f461ddd325e20de3a7a0e23f56dd05b4c3f210fb6219d2a6962a2c70a30eec8a
-
SSDEEP
768:/mf8iCXQ6FbSVO5eP4e1Ih3nQ8baOfQxhnrv:28iFVO5nnQ8uK+
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1180 uptime.exe 1868 uptime.exe -
Loads dropped DLL 2 IoCs
pid Process 1948 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 1948 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run uptime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PC UPTIME = "C:\\Users\\Admin\\AppData\\Roaming\\uptime.exe" uptime.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run uptime.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\PC UPTIME = "C:\\Users\\Admin\\AppData\\Roaming\\uptime.exe" uptime.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\systeme.acm uptime.exe File opened for modification C:\Windows\SysWOW64\systeme.acm uptime.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1444 set thread context of 1948 1444 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 27 PID 1180 set thread context of 1868 1180 uptime.exe 31 -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1948 1444 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 27 PID 1444 wrote to memory of 1948 1444 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 27 PID 1444 wrote to memory of 1948 1444 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 27 PID 1444 wrote to memory of 1948 1444 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 27 PID 1444 wrote to memory of 1948 1444 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 27 PID 1444 wrote to memory of 1948 1444 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 27 PID 1444 wrote to memory of 1948 1444 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 27 PID 1444 wrote to memory of 1948 1444 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 27 PID 1948 wrote to memory of 1180 1948 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 30 PID 1948 wrote to memory of 1180 1948 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 30 PID 1948 wrote to memory of 1180 1948 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 30 PID 1948 wrote to memory of 1180 1948 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 30 PID 1180 wrote to memory of 1868 1180 uptime.exe 31 PID 1180 wrote to memory of 1868 1180 uptime.exe 31 PID 1180 wrote to memory of 1868 1180 uptime.exe 31 PID 1180 wrote to memory of 1868 1180 uptime.exe 31 PID 1180 wrote to memory of 1868 1180 uptime.exe 31 PID 1180 wrote to memory of 1868 1180 uptime.exe 31 PID 1180 wrote to memory of 1868 1180 uptime.exe 31 PID 1180 wrote to memory of 1868 1180 uptime.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe"C:\Users\Admin\AppData\Local\Temp\410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exeC:\Users\Admin\AppData\Local\Temp\410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Roaming\uptime.exe"C:\Users\Admin\AppData\Roaming\\uptime.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Roaming\uptime.exeC:\Users\Admin\AppData\Roaming\uptime.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1868
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5057cf84ddf34c10a3d5d6ad2c7756783
SHA1316fe59833cbf1afd7d615f0777b03756a7c548a
SHA256410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9
SHA5124dedc6c45d19a1799319bd81fd7c1a69a761a36696ff569da3930eee1eed51c3f461ddd325e20de3a7a0e23f56dd05b4c3f210fb6219d2a6962a2c70a30eec8a
-
Filesize
87KB
MD5057cf84ddf34c10a3d5d6ad2c7756783
SHA1316fe59833cbf1afd7d615f0777b03756a7c548a
SHA256410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9
SHA5124dedc6c45d19a1799319bd81fd7c1a69a761a36696ff569da3930eee1eed51c3f461ddd325e20de3a7a0e23f56dd05b4c3f210fb6219d2a6962a2c70a30eec8a
-
Filesize
87KB
MD5057cf84ddf34c10a3d5d6ad2c7756783
SHA1316fe59833cbf1afd7d615f0777b03756a7c548a
SHA256410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9
SHA5124dedc6c45d19a1799319bd81fd7c1a69a761a36696ff569da3930eee1eed51c3f461ddd325e20de3a7a0e23f56dd05b4c3f210fb6219d2a6962a2c70a30eec8a
-
Filesize
87KB
MD5057cf84ddf34c10a3d5d6ad2c7756783
SHA1316fe59833cbf1afd7d615f0777b03756a7c548a
SHA256410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9
SHA5124dedc6c45d19a1799319bd81fd7c1a69a761a36696ff569da3930eee1eed51c3f461ddd325e20de3a7a0e23f56dd05b4c3f210fb6219d2a6962a2c70a30eec8a
-
Filesize
87KB
MD5057cf84ddf34c10a3d5d6ad2c7756783
SHA1316fe59833cbf1afd7d615f0777b03756a7c548a
SHA256410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9
SHA5124dedc6c45d19a1799319bd81fd7c1a69a761a36696ff569da3930eee1eed51c3f461ddd325e20de3a7a0e23f56dd05b4c3f210fb6219d2a6962a2c70a30eec8a