Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:44
Static task
static1
Behavioral task
behavioral1
Sample
e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe
Resource
win10v2004-20220812-en
General
-
Target
e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe
-
Size
161KB
-
MD5
fe116b0d03082a3ac8ca9cfeb9ce4500
-
SHA1
89aff2309c312ddcceae62129e51f296bbd27907
-
SHA256
e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a
-
SHA512
69a398d42676ab8cf0195f4c0f23792705f9a3423a9743e2ec37531a7a865a684a972ed34530b69d25d8583ee3f1f869a2ea10339509d616dcd0d33ce7460455
-
SSDEEP
3072:O1UqeDPEsbBYTN6jZ4fReG6NkHqQTtwRc6GCCT/oQXbTlOf/mdQgUfu:OuqeDPEKBYGkV6NkHq4wpGsYbTi/8QgT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
umorl.exepid process 1400 umorl.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1540 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exepid process 1404 e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe 1404 e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
umorl.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\Currentversion\Run umorl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\{AC76F728-62D5-CCA7-961F-5FBECB293897} = "C:\\Users\\Admin\\AppData\\Roaming\\Xaobal\\umorl.exe" umorl.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
umorl.exepid process 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
umorl.exepid process 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe 1400 umorl.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exedescription pid process Token: SeSecurityPrivilege 1404 e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
umorl.exepid process 1400 umorl.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exedescription pid process target process PID 1404 wrote to memory of 1400 1404 e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe umorl.exe PID 1404 wrote to memory of 1400 1404 e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe umorl.exe PID 1404 wrote to memory of 1400 1404 e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe umorl.exe PID 1404 wrote to memory of 1400 1404 e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe umorl.exe PID 1404 wrote to memory of 1540 1404 e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe cmd.exe PID 1404 wrote to memory of 1540 1404 e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe cmd.exe PID 1404 wrote to memory of 1540 1404 e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe cmd.exe PID 1404 wrote to memory of 1540 1404 e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe"C:\Users\Admin\AppData\Local\Temp\e1cfc115c0dc61198fae3f45e3b5ce92edaca691045a6b3860d2f008c0aad06a.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Roaming\Xaobal\umorl.exe"C:\Users\Admin\AppData\Roaming\Xaobal\umorl.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
PID:1400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp726873f6.bat"2⤵
- Deletes itself
PID:1540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD55596330b87294c62ea656ce29ffcf5d6
SHA140afe0b8228b388fd5f346e7230b7df440d75694
SHA25646d7321e8eee2f11f45602d40ea074e9103cb2ac2d189340089091aba779b67d
SHA5120fed913da4e9ba8e6c72ac641ba20117291bb06be2ddb41e10502bff5ef7b999314588e86694d18e7bdeb5db49cefa8901152f78fbc2531ae86b0cbebfb9e324
-
Filesize
161KB
MD53d0b200c0e52966ce6d9ca268a064ec7
SHA1d38be68dea6c1f0120d19f111f61f2d7fbabb9d0
SHA256c73b73074889a64ed44864408979af3f9f84bdb2efc1bc6a73bc53073221fb29
SHA512b38bf96da4d89f90e3df662f310ae432582deb659a4a266224e4d345afb78277ab9de4d964699b7185349d2c219ac296b253eb0e06765d846572017d72e86edd
-
Filesize
161KB
MD53d0b200c0e52966ce6d9ca268a064ec7
SHA1d38be68dea6c1f0120d19f111f61f2d7fbabb9d0
SHA256c73b73074889a64ed44864408979af3f9f84bdb2efc1bc6a73bc53073221fb29
SHA512b38bf96da4d89f90e3df662f310ae432582deb659a4a266224e4d345afb78277ab9de4d964699b7185349d2c219ac296b253eb0e06765d846572017d72e86edd
-
Filesize
161KB
MD53d0b200c0e52966ce6d9ca268a064ec7
SHA1d38be68dea6c1f0120d19f111f61f2d7fbabb9d0
SHA256c73b73074889a64ed44864408979af3f9f84bdb2efc1bc6a73bc53073221fb29
SHA512b38bf96da4d89f90e3df662f310ae432582deb659a4a266224e4d345afb78277ab9de4d964699b7185349d2c219ac296b253eb0e06765d846572017d72e86edd
-
Filesize
161KB
MD53d0b200c0e52966ce6d9ca268a064ec7
SHA1d38be68dea6c1f0120d19f111f61f2d7fbabb9d0
SHA256c73b73074889a64ed44864408979af3f9f84bdb2efc1bc6a73bc53073221fb29
SHA512b38bf96da4d89f90e3df662f310ae432582deb659a4a266224e4d345afb78277ab9de4d964699b7185349d2c219ac296b253eb0e06765d846572017d72e86edd