Analysis
-
max time kernel
152s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
088e431500f13ad5f96af8079b2e6704440bef6810903ce7f760336e65d7cece.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
088e431500f13ad5f96af8079b2e6704440bef6810903ce7f760336e65d7cece.exe
Resource
win10v2004-20221111-en
General
-
Target
088e431500f13ad5f96af8079b2e6704440bef6810903ce7f760336e65d7cece.exe
-
Size
359KB
-
MD5
03c98c932377086d5be24c119ff01175
-
SHA1
0b93bd233ddc8c1cfb5886116f37fb7c1315a5ef
-
SHA256
088e431500f13ad5f96af8079b2e6704440bef6810903ce7f760336e65d7cece
-
SHA512
bf100d25e83e0043b9c86433968eb5f70395240c79428d51d7fb563ec14e99d394b3c753d7b2c6b686939e2a4f032baa726e9c1146eb526dd6da4ac6f7e80650
-
SSDEEP
6144:xtF0wPmBjrtRAlXlNa01/Fjm+qbtPeXCOmdsP1F9nb54ceKVwCsI:xt6wPmNrtR+3ae/RmIrv4wzv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1192 uwef.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\Currentversion\Run uwef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{C39F3489-556D-BCA0-120E-0933DFFB1331} = "C:\\Users\\Admin\\AppData\\Roaming\\Eswapi\\uwef.exe" uwef.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4668 set thread context of 4532 4668 088e431500f13ad5f96af8079b2e6704440bef6810903ce7f760336e65d7cece.exe 84 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe 1192 uwef.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4668 wrote to memory of 1192 4668 088e431500f13ad5f96af8079b2e6704440bef6810903ce7f760336e65d7cece.exe 83 PID 4668 wrote to memory of 1192 4668 088e431500f13ad5f96af8079b2e6704440bef6810903ce7f760336e65d7cece.exe 83 PID 4668 wrote to memory of 1192 4668 088e431500f13ad5f96af8079b2e6704440bef6810903ce7f760336e65d7cece.exe 83 PID 1192 wrote to memory of 2528 1192 uwef.exe 5 PID 1192 wrote to memory of 2528 1192 uwef.exe 5 PID 1192 wrote to memory of 2528 1192 uwef.exe 5 PID 1192 wrote to memory of 2528 1192 uwef.exe 5 PID 1192 wrote to memory of 2528 1192 uwef.exe 5 PID 1192 wrote to memory of 2580 1192 uwef.exe 39 PID 1192 wrote to memory of 2580 1192 uwef.exe 39 PID 1192 wrote to memory of 2580 1192 uwef.exe 39 PID 1192 wrote to memory of 2580 1192 uwef.exe 39 PID 1192 wrote to memory of 2580 1192 uwef.exe 39 PID 1192 wrote to memory of 2808 1192 uwef.exe 34 PID 1192 wrote to memory of 2808 1192 uwef.exe 34 PID 1192 wrote to memory of 2808 1192 uwef.exe 34 PID 1192 wrote to memory of 2808 1192 uwef.exe 34 PID 1192 wrote to memory of 2808 1192 uwef.exe 34 PID 1192 wrote to memory of 1068 1192 uwef.exe 33 PID 1192 wrote to memory of 1068 1192 uwef.exe 33 PID 1192 wrote to memory of 1068 1192 uwef.exe 33 PID 1192 wrote to memory of 1068 1192 uwef.exe 33 PID 1192 wrote to memory of 1068 1192 uwef.exe 33 PID 1192 wrote to memory of 3104 1192 uwef.exe 9 PID 1192 wrote to memory of 3104 1192 uwef.exe 9 PID 1192 wrote to memory of 3104 1192 uwef.exe 9 PID 1192 wrote to memory of 3104 1192 uwef.exe 9 PID 1192 wrote to memory of 3104 1192 uwef.exe 9 PID 1192 wrote to memory of 3296 1192 uwef.exe 6 PID 1192 wrote to memory of 3296 1192 uwef.exe 6 PID 1192 wrote to memory of 3296 1192 uwef.exe 6 PID 1192 wrote to memory of 3296 1192 uwef.exe 6 PID 1192 wrote to memory of 3296 1192 uwef.exe 6 PID 1192 wrote to memory of 3392 1192 uwef.exe 8 PID 1192 wrote to memory of 3392 1192 uwef.exe 8 PID 1192 wrote to memory of 3392 1192 uwef.exe 8 PID 1192 wrote to memory of 3392 1192 uwef.exe 8 PID 1192 wrote to memory of 3392 1192 uwef.exe 8 PID 1192 wrote to memory of 3464 1192 uwef.exe 7 PID 1192 wrote to memory of 3464 1192 uwef.exe 7 PID 1192 wrote to memory of 3464 1192 uwef.exe 7 PID 1192 wrote to memory of 3464 1192 uwef.exe 7 PID 1192 wrote to memory of 3464 1192 uwef.exe 7 PID 1192 wrote to memory of 3560 1192 uwef.exe 32 PID 1192 wrote to memory of 3560 1192 uwef.exe 32 PID 1192 wrote to memory of 3560 1192 uwef.exe 32 PID 1192 wrote to memory of 3560 1192 uwef.exe 32 PID 1192 wrote to memory of 3560 1192 uwef.exe 32 PID 1192 wrote to memory of 3864 1192 uwef.exe 31 PID 1192 wrote to memory of 3864 1192 uwef.exe 31 PID 1192 wrote to memory of 3864 1192 uwef.exe 31 PID 1192 wrote to memory of 3864 1192 uwef.exe 31 PID 1192 wrote to memory of 3864 1192 uwef.exe 31 PID 1192 wrote to memory of 4788 1192 uwef.exe 28 PID 1192 wrote to memory of 4788 1192 uwef.exe 28 PID 1192 wrote to memory of 4788 1192 uwef.exe 28 PID 1192 wrote to memory of 4788 1192 uwef.exe 28 PID 1192 wrote to memory of 4788 1192 uwef.exe 28 PID 1192 wrote to memory of 4920 1192 uwef.exe 13 PID 1192 wrote to memory of 4920 1192 uwef.exe 13 PID 1192 wrote to memory of 4920 1192 uwef.exe 13 PID 1192 wrote to memory of 4920 1192 uwef.exe 13 PID 1192 wrote to memory of 4920 1192 uwef.exe 13 PID 1192 wrote to memory of 4988 1192 uwef.exe 12
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2528
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3296
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3464
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3392
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3104
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2436
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4988
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4920
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4788
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3864
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3560
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\088e431500f13ad5f96af8079b2e6704440bef6810903ce7f760336e65d7cece.exe"C:\Users\Admin\AppData\Local\Temp\088e431500f13ad5f96af8079b2e6704440bef6810903ce7f760336e65d7cece.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Roaming\Eswapi\uwef.exe"C:\Users\Admin\AppData\Roaming\Eswapi\uwef.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1192
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf66f71bf.bat"3⤵PID:4532
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2808
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2580
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:5068
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4080
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4120
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:3512
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2228
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2312
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5dbe25d3e3c791edfc875a32e10ce4aa0
SHA1b6a64211d8f77e53ed837616ec0c836c649ca3d7
SHA256f36ebf320b30979a0dea8469db3018259460bf3dfc752a40ad00269c3f1314c8
SHA51271cb864ba1d090021a6b196d8b344ef7719f25f74e5105f530673423aa5ea7605fe5ee9604c310652899d541aec0f1dda51912b8ecea6e7d91811879508e249a
-
Filesize
359KB
MD5923cd2c76bb8b329ebba1b15ed62db67
SHA1ae013cb3eddf179eb11f3a8f4afb1a78e7d8aaa2
SHA25670aeaedbccfdc14fd0fde1112d557e091ee0f18a0551130377790ab50c2045f8
SHA5120a69d68ee2d0f540e905e58352afec2d94a811638489488679fc496890226bc9ee1804e30ab1039d7cbffdfce1ef801ce1300427e62aead913f9b884962c4916
-
Filesize
359KB
MD5923cd2c76bb8b329ebba1b15ed62db67
SHA1ae013cb3eddf179eb11f3a8f4afb1a78e7d8aaa2
SHA25670aeaedbccfdc14fd0fde1112d557e091ee0f18a0551130377790ab50c2045f8
SHA5120a69d68ee2d0f540e905e58352afec2d94a811638489488679fc496890226bc9ee1804e30ab1039d7cbffdfce1ef801ce1300427e62aead913f9b884962c4916