Analysis
-
max time kernel
92s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:53
Behavioral task
behavioral1
Sample
99eb5ec80810d9e5d49fe6b70379bddc79879d6416bc1390b2cee6a0349f7312.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
99eb5ec80810d9e5d49fe6b70379bddc79879d6416bc1390b2cee6a0349f7312.exe
Resource
win10v2004-20220901-en
General
-
Target
99eb5ec80810d9e5d49fe6b70379bddc79879d6416bc1390b2cee6a0349f7312.exe
-
Size
18KB
-
MD5
46c59f32897238bbfc34e14a1f5eb0e9
-
SHA1
de602b833a4a605833aef6776f1f76cf20a10572
-
SHA256
99eb5ec80810d9e5d49fe6b70379bddc79879d6416bc1390b2cee6a0349f7312
-
SHA512
bc064dd5039b6964ae380b0448ad13c1463e032712acbd12d690448f23348200f93f8090fd91d1ddb48688c486724ed78f63a86641d3ee9733d39d9aaa6aa743
-
SSDEEP
384:8DFMvS0BaZ8BxuRmaQC82YOvV9SNOxrRB:8DkSEc8BgRmTcH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
cugcue.exepid process 3136 cugcue.exe -
Processes:
resource yara_rule C:\Windows\SysWOW64\cugcue.exe upx C:\Windows\SysWOW64\cugcue.exe upx behavioral2/memory/3116-134-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3136-135-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3136-137-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
cugcue.exepid process 3136 cugcue.exe -
Drops file in System32 directory 3 IoCs
Processes:
99eb5ec80810d9e5d49fe6b70379bddc79879d6416bc1390b2cee6a0349f7312.execugcue.exedescription ioc process File opened for modification C:\Windows\SysWOW64\cugcue.exe 99eb5ec80810d9e5d49fe6b70379bddc79879d6416bc1390b2cee6a0349f7312.exe File created C:\Windows\SysWOW64\gei33.dll cugcue.exe File created C:\Windows\SysWOW64\cugcue.exe 99eb5ec80810d9e5d49fe6b70379bddc79879d6416bc1390b2cee6a0349f7312.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
99eb5ec80810d9e5d49fe6b70379bddc79879d6416bc1390b2cee6a0349f7312.exepid process 3116 99eb5ec80810d9e5d49fe6b70379bddc79879d6416bc1390b2cee6a0349f7312.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\99eb5ec80810d9e5d49fe6b70379bddc79879d6416bc1390b2cee6a0349f7312.exe"C:\Users\Admin\AppData\Local\Temp\99eb5ec80810d9e5d49fe6b70379bddc79879d6416bc1390b2cee6a0349f7312.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
PID:3116
-
C:\Windows\SysWOW64\cugcue.exeC:\Windows\SysWOW64\cugcue.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3136
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD546c59f32897238bbfc34e14a1f5eb0e9
SHA1de602b833a4a605833aef6776f1f76cf20a10572
SHA25699eb5ec80810d9e5d49fe6b70379bddc79879d6416bc1390b2cee6a0349f7312
SHA512bc064dd5039b6964ae380b0448ad13c1463e032712acbd12d690448f23348200f93f8090fd91d1ddb48688c486724ed78f63a86641d3ee9733d39d9aaa6aa743
-
Filesize
18KB
MD546c59f32897238bbfc34e14a1f5eb0e9
SHA1de602b833a4a605833aef6776f1f76cf20a10572
SHA25699eb5ec80810d9e5d49fe6b70379bddc79879d6416bc1390b2cee6a0349f7312
SHA512bc064dd5039b6964ae380b0448ad13c1463e032712acbd12d690448f23348200f93f8090fd91d1ddb48688c486724ed78f63a86641d3ee9733d39d9aaa6aa743
-
Filesize
28KB
MD55e2304f296aebf689a579c15984a789a
SHA10151a407d1efb45666d5ddba4f2121757c4df3dc
SHA256cea63aab8d471579c7e9ff1b9efe67bcabcb0020947105fb15374e69da46e126
SHA5124470cafdbc72e88561984819e50ccb4fa68fdd1d35d7c76d6a34ccb3e47099d21a42888674a36185af2825aedd904d381870f4ce78c9b1e3a45d223fb4470404