Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 04:26
Static task
static1
Behavioral task
behavioral1
Sample
d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe
Resource
win10v2004-20221111-en
General
-
Target
d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe
-
Size
442KB
-
MD5
698ae325c1ea96b365a5dfed5e747856
-
SHA1
45182cf082818fa3bec5c587ce346ba297dfdb76
-
SHA256
d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e
-
SHA512
43ed818f7ab21e0d935592202b5e0e352afdd264f419aa55af2974d512ea9f5db106d2547b835f08235af2dd265cd9384605363c3691d9447a3b34830a704cf2
-
SSDEEP
12288:zNjaSdaJquKjXoCiM5ECSeR1RR9LzSCpBswx3i1cq5:zNjaTJquKcG5ENEzR9K8xx3+c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ulef.exepid process 980 ulef.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1700 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exepid process 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ulef.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run ulef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F932B98A-E184-D692-6971-E3B6223A5F48} = "C:\\Users\\Admin\\AppData\\Roaming\\Biduyg\\ulef.exe" ulef.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exedescription pid process target process PID 948 set thread context of 1700 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe cmd.exe -
Processes:
d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\6A4C7489-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
ulef.exepid process 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe 980 ulef.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exeWinMail.execmd.exedescription pid process Token: SeSecurityPrivilege 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe Token: SeSecurityPrivilege 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe Token: SeSecurityPrivilege 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe Token: SeManageVolumePrivilege 2016 WinMail.exe Token: SeSecurityPrivilege 1700 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 2016 WinMail.exe -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exeulef.exedescription pid process target process PID 948 wrote to memory of 980 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe ulef.exe PID 948 wrote to memory of 980 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe ulef.exe PID 948 wrote to memory of 980 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe ulef.exe PID 948 wrote to memory of 980 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe ulef.exe PID 980 wrote to memory of 1128 980 ulef.exe taskhost.exe PID 980 wrote to memory of 1128 980 ulef.exe taskhost.exe PID 980 wrote to memory of 1128 980 ulef.exe taskhost.exe PID 980 wrote to memory of 1128 980 ulef.exe taskhost.exe PID 980 wrote to memory of 1128 980 ulef.exe taskhost.exe PID 980 wrote to memory of 1192 980 ulef.exe Dwm.exe PID 980 wrote to memory of 1192 980 ulef.exe Dwm.exe PID 980 wrote to memory of 1192 980 ulef.exe Dwm.exe PID 980 wrote to memory of 1192 980 ulef.exe Dwm.exe PID 980 wrote to memory of 1192 980 ulef.exe Dwm.exe PID 980 wrote to memory of 1268 980 ulef.exe Explorer.EXE PID 980 wrote to memory of 1268 980 ulef.exe Explorer.EXE PID 980 wrote to memory of 1268 980 ulef.exe Explorer.EXE PID 980 wrote to memory of 1268 980 ulef.exe Explorer.EXE PID 980 wrote to memory of 1268 980 ulef.exe Explorer.EXE PID 980 wrote to memory of 948 980 ulef.exe d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe PID 980 wrote to memory of 948 980 ulef.exe d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe PID 980 wrote to memory of 948 980 ulef.exe d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe PID 980 wrote to memory of 948 980 ulef.exe d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe PID 980 wrote to memory of 948 980 ulef.exe d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe PID 980 wrote to memory of 2016 980 ulef.exe WinMail.exe PID 980 wrote to memory of 2016 980 ulef.exe WinMail.exe PID 980 wrote to memory of 2016 980 ulef.exe WinMail.exe PID 980 wrote to memory of 2016 980 ulef.exe WinMail.exe PID 980 wrote to memory of 2016 980 ulef.exe WinMail.exe PID 948 wrote to memory of 1700 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe cmd.exe PID 948 wrote to memory of 1700 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe cmd.exe PID 948 wrote to memory of 1700 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe cmd.exe PID 948 wrote to memory of 1700 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe cmd.exe PID 948 wrote to memory of 1700 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe cmd.exe PID 948 wrote to memory of 1700 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe cmd.exe PID 948 wrote to memory of 1700 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe cmd.exe PID 948 wrote to memory of 1700 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe cmd.exe PID 948 wrote to memory of 1700 948 d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe cmd.exe PID 980 wrote to memory of 1804 980 ulef.exe conhost.exe PID 980 wrote to memory of 1804 980 ulef.exe conhost.exe PID 980 wrote to memory of 1804 980 ulef.exe conhost.exe PID 980 wrote to memory of 1804 980 ulef.exe conhost.exe PID 980 wrote to memory of 1804 980 ulef.exe conhost.exe PID 980 wrote to memory of 1720 980 ulef.exe DllHost.exe PID 980 wrote to memory of 1720 980 ulef.exe DllHost.exe PID 980 wrote to memory of 1720 980 ulef.exe DllHost.exe PID 980 wrote to memory of 1720 980 ulef.exe DllHost.exe PID 980 wrote to memory of 1720 980 ulef.exe DllHost.exe PID 980 wrote to memory of 1608 980 ulef.exe DllHost.exe PID 980 wrote to memory of 1608 980 ulef.exe DllHost.exe PID 980 wrote to memory of 1608 980 ulef.exe DllHost.exe PID 980 wrote to memory of 1608 980 ulef.exe DllHost.exe PID 980 wrote to memory of 1608 980 ulef.exe DllHost.exe PID 980 wrote to memory of 652 980 ulef.exe DllHost.exe PID 980 wrote to memory of 652 980 ulef.exe DllHost.exe PID 980 wrote to memory of 652 980 ulef.exe DllHost.exe PID 980 wrote to memory of 652 980 ulef.exe DllHost.exe PID 980 wrote to memory of 652 980 ulef.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe"C:\Users\Admin\AppData\Local\Temp\d7b9385cd06fe9320dade0ce3ae6d31cc748d61aaea5b71c3534d07ee1d3087e.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Roaming\Biduyg\ulef.exe"C:\Users\Admin\AppData\Roaming\Biduyg\ulef.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa2b78323.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2016
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-8864392381396318077-645945528-1939301066-1949555070612896913-1635879234-620616008"1⤵PID:1804
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1720
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1608
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD53eb5638687291a4b2c7dbe9733b67209
SHA1a5893d3abcb72b142454613e80986e3887bc6ef8
SHA256d0ee2654e8dad5222679c78fb446575fb8d63ae7be3bd679844604e41662f4e2
SHA512009327cb199b31a4162c51ac96db7c1f0cfef51bc0e6d5ac705e30b102a1e982708176c2dfa384efd0df3bffa271d42d7bb79a69ec4389830b6e2698f4cbbb21
-
Filesize
442KB
MD5a98e7a1be655d3f056968e0047b6c223
SHA165dce259ecf2054dc44363e0893b4f66e897f6c7
SHA256ef343167104b564a553a9d128e4c5a578fbbf15a2b7fa6da47a5582ef2d87592
SHA5122263bb9394ea37897097772791793fb24cc38ee66b71d02a8014bfaec1e34bdc10041aa26b4ec1c244ee9276df860995d81a6c13d432436c71ee9f61ada01928
-
Filesize
442KB
MD5a98e7a1be655d3f056968e0047b6c223
SHA165dce259ecf2054dc44363e0893b4f66e897f6c7
SHA256ef343167104b564a553a9d128e4c5a578fbbf15a2b7fa6da47a5582ef2d87592
SHA5122263bb9394ea37897097772791793fb24cc38ee66b71d02a8014bfaec1e34bdc10041aa26b4ec1c244ee9276df860995d81a6c13d432436c71ee9f61ada01928
-
Filesize
398B
MD5afc3268e25fadf4b7213e4289b457113
SHA1749ac81fc28a8eb1e7f6994ca5f80e9aef1b0f82
SHA256117aa6c08db6d43f4f6f0308d5299039eafce31a2b800a94773cb23e687d0fe4
SHA5123a69a6e57798427309580f9f92696a9a61ec94ef86ad46feb336c3f0a8f043a008e4d803a55ab9d4f48658d600bc914f2965250adaf0d0f869ca4c801de3e48f
-
Filesize
442KB
MD5a98e7a1be655d3f056968e0047b6c223
SHA165dce259ecf2054dc44363e0893b4f66e897f6c7
SHA256ef343167104b564a553a9d128e4c5a578fbbf15a2b7fa6da47a5582ef2d87592
SHA5122263bb9394ea37897097772791793fb24cc38ee66b71d02a8014bfaec1e34bdc10041aa26b4ec1c244ee9276df860995d81a6c13d432436c71ee9f61ada01928
-
Filesize
442KB
MD5a98e7a1be655d3f056968e0047b6c223
SHA165dce259ecf2054dc44363e0893b4f66e897f6c7
SHA256ef343167104b564a553a9d128e4c5a578fbbf15a2b7fa6da47a5582ef2d87592
SHA5122263bb9394ea37897097772791793fb24cc38ee66b71d02a8014bfaec1e34bdc10041aa26b4ec1c244ee9276df860995d81a6c13d432436c71ee9f61ada01928