Analysis

  • max time kernel
    160s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:20

General

  • Target

    cba0955688200831df25ea28cfdc52e9bab94c92ab68cf0dfc75960be0941c36.exe

  • Size

    85KB

  • MD5

    9bafd1b173c1d29541eb48f9c3f8bf6f

  • SHA1

    0c50f69d93e00cc69df7d516a19d82640f3a19ba

  • SHA256

    cba0955688200831df25ea28cfdc52e9bab94c92ab68cf0dfc75960be0941c36

  • SHA512

    8504cef26463a13ce6bc113f398a3cbc5a296f62babf010be3055ac195c129fae599a425b3f64668872906ddff14b546a85a475b256ec1b0bc4582376a453fc0

  • SSDEEP

    1536:B1/cgaS5boqudHwcQZJpWGIgSVKDA9FHpqnXs57Iah+eGtebiMU:B17aLqVrFWlri2pN5UagtRMU

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Modifies registry class 58 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cba0955688200831df25ea28cfdc52e9bab94c92ab68cf0dfc75960be0941c36.exe
    "C:\Users\Admin\AppData\Local\Temp\cba0955688200831df25ea28cfdc52e9bab94c92ab68cf0dfc75960be0941c36.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /installservice
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4356
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /start
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:4864
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /uninstallservice patch:C:\Users\Admin\AppData\Local\Temp\cba0955688200831df25ea28cfdc52e9bab94c92ab68cf0dfc75960be0941c36.exe
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:4944
  • C:\Windows\SysWOW64\urdvxc.exe
    "C:\Windows\SysWOW64\urdvxc.exe" /service
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    PID:4588
  • C:\Windows\SysWOW64\urdvxc.exe
    "C:\Windows\SysWOW64\urdvxc.exe" /service
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    PID:2400

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.8.0_66\db\README-JDK.html

    Filesize

    1013B

    MD5

    e5dd4037f36e6516a8834396c7059a3c

    SHA1

    09718ef8bae0d6ca87517df56c808bd46db77194

    SHA256

    d27c3b9fdc71a044696de1a59917b261bbc879bbd2efe1cc4ae883e7420ca5d6

    SHA512

    2804253551dbd1a3fb48e4a1d7028735f0ff7516be3ecaf250aa4ee00de93448208b9aec49c771705fd2bc355dbfc10a83ce6e623e4fd638fbd98a2a7777088b

  • C:\Program Files\Java\jdk1.8.0_66\jre\Welcome.html

    Filesize

    1KB

    MD5

    4d020be7148f16ebf63e8959951fd72f

    SHA1

    fd57f6ae237ede0a4167bcbf405ac1309a78f98d

    SHA256

    3d86caa8ef08abb2639983341660b2d359f88eff74da15bc5c93a591b98584f8

    SHA512

    455a5cfbd9221d8d39c45b7488a1b8f96458a6730feb23f363a8a32c6e4e6698db98d1ded4a38b8018ab3b3057d0a1a14d8f5a2e1fed90a61d9f1505332f1c42

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\about.html

    Filesize

    1KB

    MD5

    be5ae053c2e7447b4aa28a4eedd2596f

    SHA1

    f3ec765d9a5cfef8126c3c0cca17f83bc3f30083

    SHA256

    7b81f3095140ad8ff3083edd17f58f358464a6de33fe8b7d7059bf83b17621c3

    SHA512

    8d77e56cc34fc9bbe5e1d2b0007b76a4899e522aa1be7473d2277547898ab122490d5c3a81415f20bf4efbee36560dd643f04d6f4639c309a3a50cac124d9d27

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\license.html

    Filesize

    6KB

    MD5

    9d8c3b7a6e148fcb80dc96f1dcd9be49

    SHA1

    e62d23ff3452c7359b5a8e3a7d9974235924ddb7

    SHA256

    cb5fafd5b45e6f803be7f8e523e9753cb3718d6cceee9a0057b048d9be86b997

    SHA512

    c64a906bc6046de5fc12a248993d88bb3342dd6cb7893dea47468e627e893e3fee0364ca41a7f14a3ae4bac1c77110d460edb204e665bae9c6382fc9c617f035

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\about.html

    Filesize

    1KB

    MD5

    17fb1125d8d7b6ed5f7fa28d774b076a

    SHA1

    ebb3482859f785645178ee324257fb4df4bff1a1

    SHA256

    500ca07ef68cc817d8352d142944089fdc1391e78bea103ae9a87c7e4aa12317

    SHA512

    5016b950aad0006f62f443d1ef75baa88b44a810bd270b9c3140f417edc2372e18b2464f73c9b0f06b73f1208f6a9fad3b85fee9b6d8a785b788d34a6b1197c6

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\license.html

    Filesize

    6KB

    MD5

    8c7ddb650ddac7086bb27f15926be42d

    SHA1

    0f63c9a19b5280943a84ec736c367c7ffbb1ab72

    SHA256

    0012323d78643fe60101fe8b670d714dbb402f8f42fe839fec0ecc07900ef928

    SHA512

    fbd03c73f8f7662165fff345b7d960e7d3e12f3ae3046e7d3df3d219338ba1cabe932d66ab48a64374fc2ae74968ec30700683dc6810325bf4e6721116df64c6

  • C:\Windows\SysWOW64\urdvxc.exe

    Filesize

    85KB

    MD5

    9bafd1b173c1d29541eb48f9c3f8bf6f

    SHA1

    0c50f69d93e00cc69df7d516a19d82640f3a19ba

    SHA256

    cba0955688200831df25ea28cfdc52e9bab94c92ab68cf0dfc75960be0941c36

    SHA512

    8504cef26463a13ce6bc113f398a3cbc5a296f62babf010be3055ac195c129fae599a425b3f64668872906ddff14b546a85a475b256ec1b0bc4582376a453fc0

  • C:\Windows\SysWOW64\urdvxc.exe

    Filesize

    85KB

    MD5

    9bafd1b173c1d29541eb48f9c3f8bf6f

    SHA1

    0c50f69d93e00cc69df7d516a19d82640f3a19ba

    SHA256

    cba0955688200831df25ea28cfdc52e9bab94c92ab68cf0dfc75960be0941c36

    SHA512

    8504cef26463a13ce6bc113f398a3cbc5a296f62babf010be3055ac195c129fae599a425b3f64668872906ddff14b546a85a475b256ec1b0bc4582376a453fc0

  • C:\Windows\SysWOW64\urdvxc.exe

    Filesize

    85KB

    MD5

    9bafd1b173c1d29541eb48f9c3f8bf6f

    SHA1

    0c50f69d93e00cc69df7d516a19d82640f3a19ba

    SHA256

    cba0955688200831df25ea28cfdc52e9bab94c92ab68cf0dfc75960be0941c36

    SHA512

    8504cef26463a13ce6bc113f398a3cbc5a296f62babf010be3055ac195c129fae599a425b3f64668872906ddff14b546a85a475b256ec1b0bc4582376a453fc0

  • C:\Windows\SysWOW64\urdvxc.exe

    Filesize

    85KB

    MD5

    9bafd1b173c1d29541eb48f9c3f8bf6f

    SHA1

    0c50f69d93e00cc69df7d516a19d82640f3a19ba

    SHA256

    cba0955688200831df25ea28cfdc52e9bab94c92ab68cf0dfc75960be0941c36

    SHA512

    8504cef26463a13ce6bc113f398a3cbc5a296f62babf010be3055ac195c129fae599a425b3f64668872906ddff14b546a85a475b256ec1b0bc4582376a453fc0

  • C:\Windows\SysWOW64\urdvxc.exe

    Filesize

    85KB

    MD5

    9bafd1b173c1d29541eb48f9c3f8bf6f

    SHA1

    0c50f69d93e00cc69df7d516a19d82640f3a19ba

    SHA256

    cba0955688200831df25ea28cfdc52e9bab94c92ab68cf0dfc75960be0941c36

    SHA512

    8504cef26463a13ce6bc113f398a3cbc5a296f62babf010be3055ac195c129fae599a425b3f64668872906ddff14b546a85a475b256ec1b0bc4582376a453fc0

  • C:\Windows\SysWOW64\urdvxc.exe

    Filesize

    85KB

    MD5

    9bafd1b173c1d29541eb48f9c3f8bf6f

    SHA1

    0c50f69d93e00cc69df7d516a19d82640f3a19ba

    SHA256

    cba0955688200831df25ea28cfdc52e9bab94c92ab68cf0dfc75960be0941c36

    SHA512

    8504cef26463a13ce6bc113f398a3cbc5a296f62babf010be3055ac195c129fae599a425b3f64668872906ddff14b546a85a475b256ec1b0bc4582376a453fc0

  • memory/2400-150-0x00000000001C0000-0x00000000001DF000-memory.dmp

    Filesize

    124KB

  • memory/2400-151-0x00000000001C0000-0x00000000001DF000-memory.dmp

    Filesize

    124KB

  • memory/2604-133-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2604-145-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2604-132-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/4356-134-0x0000000000000000-mapping.dmp

  • memory/4356-137-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/4588-148-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/4588-142-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/4588-147-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/4864-141-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/4864-138-0x0000000000000000-mapping.dmp

  • memory/4944-143-0x0000000000000000-mapping.dmp

  • memory/4944-146-0x00000000001C0000-0x00000000001DF000-memory.dmp

    Filesize

    124KB