Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:26
Static task
static1
Behavioral task
behavioral1
Sample
472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe
Resource
win10v2004-20220812-en
General
-
Target
472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe
-
Size
428KB
-
MD5
ad7313b71afd12bb2bdf006931fe0fd9
-
SHA1
df85d9fc222b241eb26cad8281666f2ccf901ba3
-
SHA256
472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c
-
SHA512
4505d1ba04c5d9f3d5da9dbf428bfa581272bc5c3bafda3a74b214e00a50332c42bbb790194f3363265ce0443a367a8326a1706846d169de40888365e627c6d5
-
SSDEEP
12288:vGYuufqCYpkYcnyxSPB/wTcOP6M2hElG7b7Xxk832mJOq:+UfqCOkpyxSPBoTcEh832mJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
uruja.exepid process 2560 uruja.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
uruja.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run uruja.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Uruja = "C:\\Users\\Admin\\AppData\\Roaming\\Ypukk\\uruja.exe" uruja.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exedescription pid process target process PID 2564 set thread context of 2728 2564 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
uruja.exepid process 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe 2560 uruja.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exeuruja.exedescription pid process target process PID 2564 wrote to memory of 2560 2564 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe uruja.exe PID 2564 wrote to memory of 2560 2564 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe uruja.exe PID 2564 wrote to memory of 2560 2564 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe uruja.exe PID 2560 wrote to memory of 2700 2560 uruja.exe sihost.exe PID 2560 wrote to memory of 2700 2560 uruja.exe sihost.exe PID 2560 wrote to memory of 2700 2560 uruja.exe sihost.exe PID 2560 wrote to memory of 2700 2560 uruja.exe sihost.exe PID 2560 wrote to memory of 2700 2560 uruja.exe sihost.exe PID 2560 wrote to memory of 2816 2560 uruja.exe svchost.exe PID 2560 wrote to memory of 2816 2560 uruja.exe svchost.exe PID 2560 wrote to memory of 2816 2560 uruja.exe svchost.exe PID 2560 wrote to memory of 2816 2560 uruja.exe svchost.exe PID 2560 wrote to memory of 2816 2560 uruja.exe svchost.exe PID 2560 wrote to memory of 2868 2560 uruja.exe taskhostw.exe PID 2560 wrote to memory of 2868 2560 uruja.exe taskhostw.exe PID 2560 wrote to memory of 2868 2560 uruja.exe taskhostw.exe PID 2560 wrote to memory of 2868 2560 uruja.exe taskhostw.exe PID 2560 wrote to memory of 2868 2560 uruja.exe taskhostw.exe PID 2560 wrote to memory of 2376 2560 uruja.exe Explorer.EXE PID 2560 wrote to memory of 2376 2560 uruja.exe Explorer.EXE PID 2560 wrote to memory of 2376 2560 uruja.exe Explorer.EXE PID 2560 wrote to memory of 2376 2560 uruja.exe Explorer.EXE PID 2560 wrote to memory of 2376 2560 uruja.exe Explorer.EXE PID 2560 wrote to memory of 2936 2560 uruja.exe svchost.exe PID 2560 wrote to memory of 2936 2560 uruja.exe svchost.exe PID 2560 wrote to memory of 2936 2560 uruja.exe svchost.exe PID 2560 wrote to memory of 2936 2560 uruja.exe svchost.exe PID 2560 wrote to memory of 2936 2560 uruja.exe svchost.exe PID 2560 wrote to memory of 3276 2560 uruja.exe DllHost.exe PID 2560 wrote to memory of 3276 2560 uruja.exe DllHost.exe PID 2560 wrote to memory of 3276 2560 uruja.exe DllHost.exe PID 2560 wrote to memory of 3276 2560 uruja.exe DllHost.exe PID 2560 wrote to memory of 3276 2560 uruja.exe DllHost.exe PID 2560 wrote to memory of 3376 2560 uruja.exe StartMenuExperienceHost.exe PID 2560 wrote to memory of 3376 2560 uruja.exe StartMenuExperienceHost.exe PID 2560 wrote to memory of 3376 2560 uruja.exe StartMenuExperienceHost.exe PID 2560 wrote to memory of 3376 2560 uruja.exe StartMenuExperienceHost.exe PID 2560 wrote to memory of 3376 2560 uruja.exe StartMenuExperienceHost.exe PID 2560 wrote to memory of 3444 2560 uruja.exe RuntimeBroker.exe PID 2560 wrote to memory of 3444 2560 uruja.exe RuntimeBroker.exe PID 2560 wrote to memory of 3444 2560 uruja.exe RuntimeBroker.exe PID 2560 wrote to memory of 3444 2560 uruja.exe RuntimeBroker.exe PID 2560 wrote to memory of 3444 2560 uruja.exe RuntimeBroker.exe PID 2560 wrote to memory of 3532 2560 uruja.exe SearchApp.exe PID 2560 wrote to memory of 3532 2560 uruja.exe SearchApp.exe PID 2560 wrote to memory of 3532 2560 uruja.exe SearchApp.exe PID 2560 wrote to memory of 3532 2560 uruja.exe SearchApp.exe PID 2560 wrote to memory of 3532 2560 uruja.exe SearchApp.exe PID 2560 wrote to memory of 3700 2560 uruja.exe RuntimeBroker.exe PID 2560 wrote to memory of 3700 2560 uruja.exe RuntimeBroker.exe PID 2560 wrote to memory of 3700 2560 uruja.exe RuntimeBroker.exe PID 2560 wrote to memory of 3700 2560 uruja.exe RuntimeBroker.exe PID 2560 wrote to memory of 3700 2560 uruja.exe RuntimeBroker.exe PID 2560 wrote to memory of 2564 2560 uruja.exe 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe PID 2560 wrote to memory of 2564 2560 uruja.exe 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe PID 2560 wrote to memory of 2564 2560 uruja.exe 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe PID 2560 wrote to memory of 2564 2560 uruja.exe 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe PID 2560 wrote to memory of 2564 2560 uruja.exe 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe PID 2564 wrote to memory of 2728 2564 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe PID 2564 wrote to memory of 2728 2564 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe PID 2564 wrote to memory of 2728 2564 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe PID 2564 wrote to memory of 2728 2564 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe PID 2564 wrote to memory of 2728 2564 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe PID 2564 wrote to memory of 2728 2564 472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe cmd.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe"C:\Users\Admin\AppData\Local\Temp\472b678218aeffc5d5b352550612d1da44a4734d83d1e14646440560e251fb5c.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Ypukk\uruja.exe"C:\Users\Admin\AppData\Roaming\Ypukk\uruja.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\IRL9391.bat"3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IRL9391.batFilesize
303B
MD504907fcc2532fc9d64386b2db92ef7e5
SHA1d091bd1e2e997f7b8f878c02b3f6b3cc58727d79
SHA256cb16289645bf67db96bf10a442c9995e2e4d1f3864d8a71ecb9a80755cc727af
SHA5127cd1032091a43048143bcd657c2724ab2e70b3bb83fe870f1fc155b7fa0f282765bbd4183d912fd9266148fe9973b54920a263caf4087337c4095714c01b0d1d
-
C:\Users\Admin\AppData\Roaming\Ypukk\uruja.exeFilesize
428KB
MD5d5ec348bc071044397bca68e5ac7c86a
SHA122a06dd2ed7816a941d3309ea3254f92b2eebcc3
SHA2567bc5f9e3ed6b0c1c4776effe4d35565ff6ff73ea9448021cf599b4e234e9d732
SHA512ef843e0ed2b2bdd2a40491e396c62d5a36161ec560ca4cce77e1c1f6a05dd098a759ac5dac20ed92b0e6b07cd812251b1201a2069424f44daac96fe9525804dd
-
C:\Users\Admin\AppData\Roaming\Ypukk\uruja.exeFilesize
428KB
MD5d5ec348bc071044397bca68e5ac7c86a
SHA122a06dd2ed7816a941d3309ea3254f92b2eebcc3
SHA2567bc5f9e3ed6b0c1c4776effe4d35565ff6ff73ea9448021cf599b4e234e9d732
SHA512ef843e0ed2b2bdd2a40491e396c62d5a36161ec560ca4cce77e1c1f6a05dd098a759ac5dac20ed92b0e6b07cd812251b1201a2069424f44daac96fe9525804dd
-
memory/2560-147-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/2560-135-0x0000000000000000-mapping.dmp
-
memory/2560-148-0x00000000025E0000-0x00000000029E0000-memory.dmpFilesize
4.0MB
-
memory/2560-161-0x00000000025E0000-0x00000000029E0000-memory.dmpFilesize
4.0MB
-
memory/2564-140-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/2564-139-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/2564-141-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/2564-142-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/2564-143-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/2564-144-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/2564-136-0x00000000027B0000-0x0000000002BB0000-memory.dmpFilesize
4.0MB
-
memory/2564-132-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/2564-133-0x00000000027B0000-0x0000000002BB0000-memory.dmpFilesize
4.0MB
-
memory/2564-134-0x00000000027B0000-0x0000000002BB0000-memory.dmpFilesize
4.0MB
-
memory/2564-149-0x00000000026D0000-0x0000000002719000-memory.dmpFilesize
292KB
-
memory/2564-150-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/2564-151-0x00000000027B0000-0x0000000002BB0000-memory.dmpFilesize
4.0MB
-
memory/2728-146-0x0000000000600000-0x0000000000649000-memory.dmpFilesize
292KB
-
memory/2728-155-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/2728-154-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/2728-153-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/2728-156-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/2728-157-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/2728-158-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/2728-152-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/2728-160-0x0000000000600000-0x0000000000649000-memory.dmpFilesize
292KB
-
memory/2728-145-0x0000000000000000-mapping.dmp