Analysis
-
max time kernel
76s -
max time network
81s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-11-2022 02:00
Static task
static1
Behavioral task
behavioral1
Sample
aa8b46427e37969fcca8db8667c0c7f63276467a70dc739d1c5391fd2c3bc3a4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa8b46427e37969fcca8db8667c0c7f63276467a70dc739d1c5391fd2c3bc3a4.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
aa8b46427e37969fcca8db8667c0c7f63276467a70dc739d1c5391fd2c3bc3a4.exe
-
Size
471KB
-
MD5
86d1807600b289f064bae30005145b5d
-
SHA1
265e5ac12e7348a804f72857393a5b13e5843173
-
SHA256
aa8b46427e37969fcca8db8667c0c7f63276467a70dc739d1c5391fd2c3bc3a4
-
SHA512
c740c534a84c90489b6de2178ccdbe06adc957c2d6759e20de10ad7b00b795aefdbd3321e162c6b6cbff8064911101f3b9fe65665256290a1360660b27f65fe2
-
SSDEEP
12288:zTloC1bARFKPLDt0/Fon3Tst8B6rOSKED:zTJAnWXt0/G3TstG6r9V
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
pid Process 1988 bcdedit.exe 2000 bcdedit.exe 1944 bcdedit.exe 1692 bcdedit.exe 1440 bcdedit.exe 1468 bcdedit.exe 1404 bcdedit.exe 1668 bcdedit.exe 1252 bcdedit.exe 2044 bcdedit.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\6c3c46.sys kuedu.exe -
Executes dropped EXE 1 IoCs
pid Process 1528 kuedu.exe -
Deletes itself 1 IoCs
pid Process 2040 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1044 aa8b46427e37969fcca8db8667c0c7f63276467a70dc739d1c5391fd2c3bc3a4.exe 1044 aa8b46427e37969fcca8db8667c0c7f63276467a70dc739d1c5391fd2c3bc3a4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run kuedu.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kuedu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Ywohpa\\kuedu.exe" kuedu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1044 set thread context of 2040 1044 aa8b46427e37969fcca8db8667c0c7f63276467a70dc739d1c5391fd2c3bc3a4.exe 48 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1044 aa8b46427e37969fcca8db8667c0c7f63276467a70dc739d1c5391fd2c3bc3a4.exe 1528 kuedu.exe 1528 kuedu.exe 1528 kuedu.exe 1528 kuedu.exe 1528 kuedu.exe 1528 kuedu.exe 1528 kuedu.exe 1528 kuedu.exe 1528 kuedu.exe 1528 kuedu.exe 1528 kuedu.exe 1528 kuedu.exe 1528 kuedu.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1528 kuedu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1528 1044 aa8b46427e37969fcca8db8667c0c7f63276467a70dc739d1c5391fd2c3bc3a4.exe 27 PID 1044 wrote to memory of 1528 1044 aa8b46427e37969fcca8db8667c0c7f63276467a70dc739d1c5391fd2c3bc3a4.exe 27 PID 1044 wrote to memory of 1528 1044 aa8b46427e37969fcca8db8667c0c7f63276467a70dc739d1c5391fd2c3bc3a4.exe 27 PID 1044 wrote to memory of 1528 1044 aa8b46427e37969fcca8db8667c0c7f63276467a70dc739d1c5391fd2c3bc3a4.exe 27 PID 1528 wrote to memory of 1988 1528 kuedu.exe 28 PID 1528 wrote to memory of 1988 1528 kuedu.exe 28 PID 1528 wrote to memory of 1988 1528 kuedu.exe 28 PID 1528 wrote to memory of 1988 1528 kuedu.exe 28 PID 1528 wrote to memory of 2000 1528 kuedu.exe 29 PID 1528 wrote to memory of 2000 1528 kuedu.exe 29 PID 1528 wrote to memory of 2000 1528 kuedu.exe 29 PID 1528 wrote to memory of 2000 1528 kuedu.exe 29 PID 1528 wrote to memory of 1944 1528 kuedu.exe 31 PID 1528 wrote to memory of 1944 1528 kuedu.exe 31 PID 1528 wrote to memory of 1944 1528 kuedu.exe 31 PID 1528 wrote to memory of 1944 1528 kuedu.exe 31 PID 1528 wrote to memory of 1692 1528 kuedu.exe 33 PID 1528 wrote to memory of 1692 1528 kuedu.exe 33 PID 1528 wrote to memory of 1692 1528 kuedu.exe 33 PID 1528 wrote to memory of 1692 1528 kuedu.exe 33 PID 1528 wrote to memory of 1440 1528 kuedu.exe 34 PID 1528 wrote to memory of 1440 1528 kuedu.exe 34 PID 1528 wrote to memory of 1440 1528 kuedu.exe 34 PID 1528 wrote to memory of 1440 1528 kuedu.exe 34 PID 1528 wrote to memory of 1468 1528 kuedu.exe 35 PID 1528 wrote to memory of 1468 1528 kuedu.exe 35 PID 1528 wrote to memory of 1468 1528 kuedu.exe 35 PID 1528 wrote to memory of 1468 1528 kuedu.exe 35 PID 1528 wrote to memory of 1404 1528 kuedu.exe 38 PID 1528 wrote to memory of 1404 1528 kuedu.exe 38 PID 1528 wrote to memory of 1404 1528 kuedu.exe 38 PID 1528 wrote to memory of 1404 1528 kuedu.exe 38 PID 1528 wrote to memory of 1668 1528 kuedu.exe 40 PID 1528 wrote to memory of 1668 1528 kuedu.exe 40 PID 1528 wrote to memory of 1668 1528 kuedu.exe 40 PID 1528 wrote to memory of 1668 1528 kuedu.exe 40 PID 1528 wrote to memory of 1252 1528 kuedu.exe 41 PID 1528 wrote to memory of 1252 1528 kuedu.exe 41 PID 1528 wrote to memory of 1252 1528 kuedu.exe 41 PID 1528 wrote to memory of 1252 1528 kuedu.exe 41 PID 1528 wrote to memory of 2044 1528 kuedu.exe 45 PID 1528 wrote to memory of 2044 1528 kuedu.exe 45 PID 1528 wrote to memory of 2044 1528 kuedu.exe 45 PID 1528 wrote to memory of 2044 1528 kuedu.exe 45 PID 1528 wrote to memory of 1100 1528 kuedu.exe 18 PID 1528 wrote to memory of 1100 1528 kuedu.exe 18 PID 1528 wrote to memory of 1100 1528 kuedu.exe 18 PID 1528 wrote to memory of 1100 1528 kuedu.exe 18 PID 1528 wrote to memory of 1100 1528 kuedu.exe 18 PID 1528 wrote to memory of 1172 1528 kuedu.exe 16 PID 1528 wrote to memory of 1172 1528 kuedu.exe 16 PID 1528 wrote to memory of 1172 1528 kuedu.exe 16 PID 1528 wrote to memory of 1172 1528 kuedu.exe 16 PID 1528 wrote to memory of 1172 1528 kuedu.exe 16 PID 1528 wrote to memory of 1200 1528 kuedu.exe 15 PID 1528 wrote to memory of 1200 1528 kuedu.exe 15 PID 1528 wrote to memory of 1200 1528 kuedu.exe 15 PID 1528 wrote to memory of 1200 1528 kuedu.exe 15 PID 1528 wrote to memory of 1200 1528 kuedu.exe 15 PID 1528 wrote to memory of 1044 1528 kuedu.exe 26 PID 1528 wrote to memory of 1044 1528 kuedu.exe 26 PID 1528 wrote to memory of 1044 1528 kuedu.exe 26 PID 1528 wrote to memory of 1044 1528 kuedu.exe 26 PID 1528 wrote to memory of 1044 1528 kuedu.exe 26
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\aa8b46427e37969fcca8db8667c0c7f63276467a70dc739d1c5391fd2c3bc3a4.exe"C:\Users\Admin\AppData\Local\Temp\aa8b46427e37969fcca8db8667c0c7f63276467a70dc739d1c5391fd2c3bc3a4.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\Ywohpa\kuedu.exe"C:\Users\Admin\AppData\Local\Temp\Ywohpa\kuedu.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1988
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:2000
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1944
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1692
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1440
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1468
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1404
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1668
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1252
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TGV44EB.bat"3⤵
- Deletes itself
PID:2040
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:856
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD5e87b9a9daf93c54ca32305a5f1ef2959
SHA1a4f0455f648e1c645c76ae99f5b3dbb7a2e65237
SHA256bfc5089a2fbfd828d8996b9c3e7189df41001c80e3d25ccb90d099116f2a7722
SHA512de3fbfc3e6a099a3dceeae8fa20f8da2ccb456a3fc15557eb83094fcdd6a6584629e7ba8593597cc3cedc32379c5d1bf5faf2f29fe32657b180b1bf567007caf
-
Filesize
471KB
MD505b58568b9b5ad7ab652492c7b1714f1
SHA1b32411d16d9e3843817cf725f21ffa0042773199
SHA2562482bc4b2e73e1b03c09f05872e567473706f9c854c74c07595043679eed0e19
SHA5121d03efea4bd71ee2f9b09f51619cf617d19a4a3a181564968e67b935490a32c351a3ea3a150ab4daeb4d5797398d28ab31f4b400a82143f529c3c25218999daf
-
Filesize
471KB
MD505b58568b9b5ad7ab652492c7b1714f1
SHA1b32411d16d9e3843817cf725f21ffa0042773199
SHA2562482bc4b2e73e1b03c09f05872e567473706f9c854c74c07595043679eed0e19
SHA5121d03efea4bd71ee2f9b09f51619cf617d19a4a3a181564968e67b935490a32c351a3ea3a150ab4daeb4d5797398d28ab31f4b400a82143f529c3c25218999daf
-
Filesize
471KB
MD505b58568b9b5ad7ab652492c7b1714f1
SHA1b32411d16d9e3843817cf725f21ffa0042773199
SHA2562482bc4b2e73e1b03c09f05872e567473706f9c854c74c07595043679eed0e19
SHA5121d03efea4bd71ee2f9b09f51619cf617d19a4a3a181564968e67b935490a32c351a3ea3a150ab4daeb4d5797398d28ab31f4b400a82143f529c3c25218999daf
-
Filesize
471KB
MD505b58568b9b5ad7ab652492c7b1714f1
SHA1b32411d16d9e3843817cf725f21ffa0042773199
SHA2562482bc4b2e73e1b03c09f05872e567473706f9c854c74c07595043679eed0e19
SHA5121d03efea4bd71ee2f9b09f51619cf617d19a4a3a181564968e67b935490a32c351a3ea3a150ab4daeb4d5797398d28ab31f4b400a82143f529c3c25218999daf