Analysis
-
max time kernel
163s -
max time network
201s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe
Resource
win10v2004-20221111-en
General
-
Target
RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe
-
Size
176KB
-
MD5
26599a5d851894bac450a5529f779960
-
SHA1
86ad307147dcc84a84433c6728444f8f36e7a1e8
-
SHA256
5375bce7f7d28f834652064ba8c6f41864f3e1fef385aa093a14cf00165976de
-
SHA512
87a354060184dc12c9ee156e863cf62ebb95bb3557c75851c987cf3889f7445ccf2e1c9b93ceb6a1bc74ae5fcf03d60b3a8b93cf112f1586a5a033b1a4b6199b
-
SSDEEP
3072:K1tv0jMkCL5x8KxMFS/71d0u6O6DZxwWpPcrKxCtxQ/LgM8rPp0j0:KTCEXz/7D0u6RlxRPk8P8r+I
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1136 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\uhbkhryw.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Identities\\uhbkhryw.exe\"" Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1188 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe 1188 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1188 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe 1248 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1188 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe Token: SeDebugPrivilege 1248 Explorer.EXE Token: SeShutdownPrivilege 1248 Explorer.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1188 wrote to memory of 1136 1188 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe 28 PID 1188 wrote to memory of 1136 1188 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe 28 PID 1188 wrote to memory of 1136 1188 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe 28 PID 1188 wrote to memory of 1136 1188 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe 28 PID 1188 wrote to memory of 1248 1188 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe 18 PID 1248 wrote to memory of 1116 1248 Explorer.EXE 11 PID 1248 wrote to memory of 1204 1248 Explorer.EXE 19 PID 1248 wrote to memory of 1188 1248 Explorer.EXE 27 PID 1248 wrote to memory of 1136 1248 Explorer.EXE 28 PID 1248 wrote to memory of 1136 1248 Explorer.EXE 28 PID 1248 wrote to memory of 2012 1248 Explorer.EXE 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe"C:\Users\Admin\AppData\Local\Temp\RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS4763~1.BAT"3⤵
- Deletes itself
PID:1136
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1204
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "803480712-329044235-116425113011546383204367718301639398148-19664978-2081135268"1⤵PID:2012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD5e4930b9a97c11a0db56edfb71638e84b
SHA1d88c4f66c27d5820bae884116da617aab1c77939
SHA25630b072772b2ecf557a907abcd7650faaaf953ea68e4d261e37937b514985fd99
SHA512ae7d7d5bb3ff9f13780f339ede6b90066dbd98bd0b570ff8c0956c8248a28367b0416c5babdcbaa37107c1c1e587b70d25c1ef7bb87152798779d98b41e9b7cb