Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:41
Static task
static1
Behavioral task
behavioral1
Sample
e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe
Resource
win10v2004-20220812-en
General
-
Target
e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe
-
Size
216KB
-
MD5
44a136ae67accab96d8ab53a5f54d000
-
SHA1
903bbada00149c417266e0fa7b298640f9080bcc
-
SHA256
e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98
-
SHA512
5a0aedd698d909fcc4fb9481f65908e72bd371dc9fe155b21f3973f4ac840cb9b1568d7025379afe5fce14f4ac8f5e24c438dacdfee5a599c3f933340319cda5
-
SSDEEP
3072:ol3qOf+5or1QcMgmST9F+bAsOekqMhOdFAeRV8HDO4O2Vurl3dQ4GCH:dOf+5UpMdkF+8sOKmw+eR8kFdO
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\UXTvMlrT.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\UXTvMlrT.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\UXTvMlrT.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\UXTvMlrT.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
UXTvMlrT.exepid process 2012 UXTvMlrT.exe -
Loads dropped DLL 2 IoCs
Processes:
e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exepid process 1900 e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe 1900 e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe -
Drops file in Program Files directory 64 IoCs
Processes:
UXTvMlrT.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe UXTvMlrT.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe UXTvMlrT.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe UXTvMlrT.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe UXTvMlrT.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe UXTvMlrT.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateOnDemand.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\89.0.4389.114\chrome_installer.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLSERVER.EXE UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdate.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateCore.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE UXTvMlrT.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe UXTvMlrT.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe UXTvMlrT.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-hang-ui.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE UXTvMlrT.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateComRegisterShell64.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe UXTvMlrT.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe UXTvMlrT.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe UXTvMlrT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exeUXTvMlrT.exedescription pid process target process PID 1900 wrote to memory of 2012 1900 e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe UXTvMlrT.exe PID 1900 wrote to memory of 2012 1900 e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe UXTvMlrT.exe PID 1900 wrote to memory of 2012 1900 e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe UXTvMlrT.exe PID 1900 wrote to memory of 2012 1900 e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe UXTvMlrT.exe PID 2012 wrote to memory of 1256 2012 UXTvMlrT.exe cmd.exe PID 2012 wrote to memory of 1256 2012 UXTvMlrT.exe cmd.exe PID 2012 wrote to memory of 1256 2012 UXTvMlrT.exe cmd.exe PID 2012 wrote to memory of 1256 2012 UXTvMlrT.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe"C:\Users\Admin\AppData\Local\Temp\e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\UXTvMlrT.exeC:\Users\Admin\AppData\Local\Temp\UXTvMlrT.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\72b4471f.bat" "3⤵PID:1256
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191B
MD5c0df0bd7f92927beed2f877e0d58349a
SHA1c178036ae8fc713c04a7d3bf398c8cda3808b99e
SHA2561b1a5e6ac4a5c863844352e8df127548e9ccaee527b93f62c8a2f68b832260da
SHA51201ed855b561f1df9fa84f16df31c383b5ea952ae142e1e925208d98020258dee3c3d0947bf16f090af6d2e9223589cac82f72b4cb1e7c15a3cc1224ad0d7ec8c
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e