Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:26
Static task
static1
Behavioral task
behavioral1
Sample
472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe
Resource
win10v2004-20220812-en
General
-
Target
472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe
-
Size
428KB
-
MD5
ad7313b71afd12bb2bdf006931fe0fd9
-
SHA1
df85d9fc222b241eb26cad8281666f2ccf901ba3
-
SHA256
472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c
-
SHA512
4505d1ba04c5d9f3d5da9dbf428bfa581272bc5c3bafda3a74b214e00a50332c42bbb790194f3363265ce0443a367a8326a1706846d169de40888365e627c6d5
-
SSDEEP
12288:vGYuufqCYpkYcnyxSPB/wTcOP6M2hElG7b7Xxk832mJOq:+UfqCOkpyxSPBoTcEh832mJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ucly.exepid process 952 ucly.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2016 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exepid process 1304 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ucly.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run ucly.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ucly = "C:\\Users\\Admin\\AppData\\Roaming\\Baos\\ucly.exe" ucly.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exedescription pid process target process PID 1304 set thread context of 2016 1304 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
ucly.exepid process 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe 952 ucly.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exeucly.exedescription pid process target process PID 1304 wrote to memory of 952 1304 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe ucly.exe PID 1304 wrote to memory of 952 1304 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe ucly.exe PID 1304 wrote to memory of 952 1304 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe ucly.exe PID 1304 wrote to memory of 952 1304 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe ucly.exe PID 952 wrote to memory of 1140 952 ucly.exe taskhost.exe PID 952 wrote to memory of 1140 952 ucly.exe taskhost.exe PID 952 wrote to memory of 1140 952 ucly.exe taskhost.exe PID 952 wrote to memory of 1140 952 ucly.exe taskhost.exe PID 952 wrote to memory of 1140 952 ucly.exe taskhost.exe PID 952 wrote to memory of 1204 952 ucly.exe Dwm.exe PID 952 wrote to memory of 1204 952 ucly.exe Dwm.exe PID 952 wrote to memory of 1204 952 ucly.exe Dwm.exe PID 952 wrote to memory of 1204 952 ucly.exe Dwm.exe PID 952 wrote to memory of 1204 952 ucly.exe Dwm.exe PID 952 wrote to memory of 1288 952 ucly.exe Explorer.EXE PID 952 wrote to memory of 1288 952 ucly.exe Explorer.EXE PID 952 wrote to memory of 1288 952 ucly.exe Explorer.EXE PID 952 wrote to memory of 1288 952 ucly.exe Explorer.EXE PID 952 wrote to memory of 1288 952 ucly.exe Explorer.EXE PID 952 wrote to memory of 1304 952 ucly.exe 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe PID 952 wrote to memory of 1304 952 ucly.exe 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe PID 952 wrote to memory of 1304 952 ucly.exe 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe PID 952 wrote to memory of 1304 952 ucly.exe 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe PID 952 wrote to memory of 1304 952 ucly.exe 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe PID 1304 wrote to memory of 2016 1304 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe PID 1304 wrote to memory of 2016 1304 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe PID 1304 wrote to memory of 2016 1304 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe PID 1304 wrote to memory of 2016 1304 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe PID 1304 wrote to memory of 2016 1304 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe PID 1304 wrote to memory of 2016 1304 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe PID 1304 wrote to memory of 2016 1304 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe PID 1304 wrote to memory of 2016 1304 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe PID 1304 wrote to memory of 2016 1304 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1140
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe"C:\Users\Admin\AppData\Local\Temp\472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Roaming\Baos\ucly.exe"C:\Users\Admin\AppData\Roaming\Baos\ucly.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\MKW95C7.bat"3⤵
- Deletes itself
PID:2016
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD53c54a3132b8a6de7b8cfca5980ec3431
SHA139eb9d8a8e6b8b283c8b52443d70eef2c52c1a77
SHA256c2cedafb99881f83d67c769a6100a830437412fbd340ed0e9caf39fda243a59a
SHA512ef31627a270c8af05851c8b60a6ce8d4279851ab9c993afbbf092f2b000236c850b5607951df3f0fd6518a54451abf2aa1ae37d6c6594ec874e9dde535a879a7
-
Filesize
428KB
MD573164766a57301730dc19bc3786d6cca
SHA17896f11178ce31c6a81ea3e758dcc6bb1bce4ca6
SHA256abdd8328413ab01f436516c6396cec60b348d6f904ad937905da120a1d360585
SHA51214408ee37d2a83646a4e14b8470179821203ad2472b486c3619b0f8c06ec4f731d48dac18b208f8a33084111ad4dffb99f4567a67c05749814800d828da67f99
-
Filesize
428KB
MD573164766a57301730dc19bc3786d6cca
SHA17896f11178ce31c6a81ea3e758dcc6bb1bce4ca6
SHA256abdd8328413ab01f436516c6396cec60b348d6f904ad937905da120a1d360585
SHA51214408ee37d2a83646a4e14b8470179821203ad2472b486c3619b0f8c06ec4f731d48dac18b208f8a33084111ad4dffb99f4567a67c05749814800d828da67f99
-
Filesize
428KB
MD573164766a57301730dc19bc3786d6cca
SHA17896f11178ce31c6a81ea3e758dcc6bb1bce4ca6
SHA256abdd8328413ab01f436516c6396cec60b348d6f904ad937905da120a1d360585
SHA51214408ee37d2a83646a4e14b8470179821203ad2472b486c3619b0f8c06ec4f731d48dac18b208f8a33084111ad4dffb99f4567a67c05749814800d828da67f99