Analysis
-
max time kernel
186s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:31
Static task
static1
Behavioral task
behavioral1
Sample
3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe
Resource
win10v2004-20220812-en
General
-
Target
3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe
-
Size
319KB
-
MD5
f81c2a86407179eb7c6637c921997e01
-
SHA1
e9a0ba76ae861e94738bf52250efbedf819ee3d0
-
SHA256
3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490
-
SHA512
38fa149cb61cff212dc13f9b41f0d5e69de1cd66ce4daada47a14daf5e3ea36fce07f9251cf085ac63b980f567af9634e3d70f312a5afc05fafe8c5c6529cbc5
-
SSDEEP
6144:+XQddP4+FTexgczIapcDwCfW6Pg3asNa4V0+:+XQdNdczDOwQWioZ7
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
ukma.exeukma.exepid process 1972 ukma.exe 1500 ukma.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1484 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exepid process 1076 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe 1076 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\{38943D6D-1EF6-CDD7-6EE3-79F6559FCB15} = "\"C:\\Users\\Admin\\AppData\\Roaming\\Oqte\\ukma.exe\"" explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exeukma.exedescription pid process target process PID 960 set thread context of 1076 960 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe PID 1972 set thread context of 1500 1972 ukma.exe ukma.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\204E5CE6-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exeukma.exeukma.exeexplorer.exepid process 960 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe 960 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe 1972 ukma.exe 1972 ukma.exe 1500 ukma.exe 1500 ukma.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
ukma.exepid process 1500 ukma.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 1076 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe Token: SeManageVolumePrivilege 1328 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WinMail.exepid process 1328 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WinMail.exepid process 1328 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 1328 WinMail.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exeukma.exeukma.exeexplorer.exedescription pid process target process PID 960 wrote to memory of 1076 960 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe PID 960 wrote to memory of 1076 960 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe PID 960 wrote to memory of 1076 960 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe PID 960 wrote to memory of 1076 960 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe PID 960 wrote to memory of 1076 960 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe PID 960 wrote to memory of 1076 960 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe PID 960 wrote to memory of 1076 960 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe PID 960 wrote to memory of 1076 960 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe PID 960 wrote to memory of 1076 960 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe PID 960 wrote to memory of 1076 960 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe PID 1076 wrote to memory of 1972 1076 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe ukma.exe PID 1076 wrote to memory of 1972 1076 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe ukma.exe PID 1076 wrote to memory of 1972 1076 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe ukma.exe PID 1076 wrote to memory of 1972 1076 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe ukma.exe PID 1972 wrote to memory of 1500 1972 ukma.exe ukma.exe PID 1972 wrote to memory of 1500 1972 ukma.exe ukma.exe PID 1972 wrote to memory of 1500 1972 ukma.exe ukma.exe PID 1972 wrote to memory of 1500 1972 ukma.exe ukma.exe PID 1972 wrote to memory of 1500 1972 ukma.exe ukma.exe PID 1972 wrote to memory of 1500 1972 ukma.exe ukma.exe PID 1972 wrote to memory of 1500 1972 ukma.exe ukma.exe PID 1972 wrote to memory of 1500 1972 ukma.exe ukma.exe PID 1972 wrote to memory of 1500 1972 ukma.exe ukma.exe PID 1972 wrote to memory of 1500 1972 ukma.exe ukma.exe PID 1076 wrote to memory of 1484 1076 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe cmd.exe PID 1076 wrote to memory of 1484 1076 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe cmd.exe PID 1076 wrote to memory of 1484 1076 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe cmd.exe PID 1076 wrote to memory of 1484 1076 3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe cmd.exe PID 1500 wrote to memory of 692 1500 ukma.exe explorer.exe PID 1500 wrote to memory of 692 1500 ukma.exe explorer.exe PID 1500 wrote to memory of 692 1500 ukma.exe explorer.exe PID 1500 wrote to memory of 692 1500 ukma.exe explorer.exe PID 692 wrote to memory of 1220 692 explorer.exe Explorer.EXE PID 692 wrote to memory of 1220 692 explorer.exe Explorer.EXE PID 692 wrote to memory of 1220 692 explorer.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe"C:\Users\Admin\AppData\Local\Temp\3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe"C:\Users\Admin\AppData\Local\Temp\3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Roaming\Oqte\ukma.exe"C:\Users\Admin\AppData\Roaming\Oqte\ukma.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Roaming\Oqte\ukma.exe"C:\Users\Admin\AppData\Roaming\Oqte\ukma.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"6⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp73afaea6.bat"4⤵
- Deletes itself
PID:1484
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD51a25ce09a8b74ef9f76dfc06a8b2b367
SHA12b3212fd7675a190529176c02ae791b570eb9469
SHA25637930005ebce7815c0fd525f3066d211ab4eb31523ae06ba37f5df8d01c3d9f2
SHA512c1ea7e391488a7e4697410571fac47da92a6ec79b10ddfbc6159aeb24acf7f957b8e4065580ab8a4ff218fe4157ceddadd1dd6fbc66e6c1f2cf51c699fda03e3
-
Filesize
319KB
MD58ccacd1a3bfa9a3846c6c726769e6fad
SHA11e6d433f0983ce00e9eaf6afef4a1e25bcb488f1
SHA25656217198c9368f05bfcd0f9b2897ce4402ebdfd25235b0b1dfe34d79a1636279
SHA51262938a0f5a1be84867e8b65412e1af79bd691835fb116e073f621a74cd2b7138293cc4dc5d5e17ebe2aaa73d62bdb3b7c0873de78668e3ebfd6c1d0e305ee479
-
Filesize
319KB
MD58ccacd1a3bfa9a3846c6c726769e6fad
SHA11e6d433f0983ce00e9eaf6afef4a1e25bcb488f1
SHA25656217198c9368f05bfcd0f9b2897ce4402ebdfd25235b0b1dfe34d79a1636279
SHA51262938a0f5a1be84867e8b65412e1af79bd691835fb116e073f621a74cd2b7138293cc4dc5d5e17ebe2aaa73d62bdb3b7c0873de78668e3ebfd6c1d0e305ee479
-
Filesize
319KB
MD58ccacd1a3bfa9a3846c6c726769e6fad
SHA11e6d433f0983ce00e9eaf6afef4a1e25bcb488f1
SHA25656217198c9368f05bfcd0f9b2897ce4402ebdfd25235b0b1dfe34d79a1636279
SHA51262938a0f5a1be84867e8b65412e1af79bd691835fb116e073f621a74cd2b7138293cc4dc5d5e17ebe2aaa73d62bdb3b7c0873de78668e3ebfd6c1d0e305ee479
-
Filesize
319KB
MD58ccacd1a3bfa9a3846c6c726769e6fad
SHA11e6d433f0983ce00e9eaf6afef4a1e25bcb488f1
SHA25656217198c9368f05bfcd0f9b2897ce4402ebdfd25235b0b1dfe34d79a1636279
SHA51262938a0f5a1be84867e8b65412e1af79bd691835fb116e073f621a74cd2b7138293cc4dc5d5e17ebe2aaa73d62bdb3b7c0873de78668e3ebfd6c1d0e305ee479
-
Filesize
319KB
MD58ccacd1a3bfa9a3846c6c726769e6fad
SHA11e6d433f0983ce00e9eaf6afef4a1e25bcb488f1
SHA25656217198c9368f05bfcd0f9b2897ce4402ebdfd25235b0b1dfe34d79a1636279
SHA51262938a0f5a1be84867e8b65412e1af79bd691835fb116e073f621a74cd2b7138293cc4dc5d5e17ebe2aaa73d62bdb3b7c0873de78668e3ebfd6c1d0e305ee479