Analysis
-
max time kernel
151s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 12:51
Static task
static1
Behavioral task
behavioral1
Sample
755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe
Resource
win10v2004-20221111-en
General
-
Target
755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe
-
Size
256KB
-
MD5
bddc29c99880f0ffd86d2f81638481cd
-
SHA1
9ea33af7a5f6a9a49c4478789df5e6df90d9b2f1
-
SHA256
755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e
-
SHA512
9bd2e38c2c2221bf8557920a26121a4bf84e08e63498c89f3921b182c1bfc9666613d0d41ad98b72c8b993a91767387474717b8d84f72dac6cef2ca4cc17f43b
-
SSDEEP
6144:mfaI3NYI996MCsMFKiMjgEyfwIJRbu43jfjfdzeuUh0p43ePuM:mfaI9YQ93CZFKjjg8yk43jfjfvIM
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
ucucb.exeucucb.exepid process 1680 ucucb.exe 984 ucucb.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 652 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exepid process 1064 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe 1064 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ucucb.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\Currentversion\Run ucucb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\{186D5FCD-218F-72DA-98B9-9D5AD151172F} = "C:\\Users\\Admin\\AppData\\Roaming\\Miafy\\ucucb.exe" ucucb.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exeucucb.exedescription pid process target process PID 1192 set thread context of 1064 1192 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe PID 1680 set thread context of 984 1680 ucucb.exe ucucb.exe -
Processes:
755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
ucucb.exepid process 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe 984 ucucb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exedescription pid process Token: SeSecurityPrivilege 1064 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exeucucb.exepid process 1192 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe 1680 ucucb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exeucucb.exeucucb.exedescription pid process target process PID 1192 wrote to memory of 1064 1192 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe PID 1192 wrote to memory of 1064 1192 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe PID 1192 wrote to memory of 1064 1192 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe PID 1192 wrote to memory of 1064 1192 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe PID 1192 wrote to memory of 1064 1192 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe PID 1192 wrote to memory of 1064 1192 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe PID 1192 wrote to memory of 1064 1192 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe PID 1192 wrote to memory of 1064 1192 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe PID 1192 wrote to memory of 1064 1192 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe PID 1064 wrote to memory of 1680 1064 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe ucucb.exe PID 1064 wrote to memory of 1680 1064 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe ucucb.exe PID 1064 wrote to memory of 1680 1064 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe ucucb.exe PID 1064 wrote to memory of 1680 1064 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe ucucb.exe PID 1680 wrote to memory of 984 1680 ucucb.exe ucucb.exe PID 1680 wrote to memory of 984 1680 ucucb.exe ucucb.exe PID 1680 wrote to memory of 984 1680 ucucb.exe ucucb.exe PID 1680 wrote to memory of 984 1680 ucucb.exe ucucb.exe PID 1680 wrote to memory of 984 1680 ucucb.exe ucucb.exe PID 1680 wrote to memory of 984 1680 ucucb.exe ucucb.exe PID 1680 wrote to memory of 984 1680 ucucb.exe ucucb.exe PID 1680 wrote to memory of 984 1680 ucucb.exe ucucb.exe PID 1680 wrote to memory of 984 1680 ucucb.exe ucucb.exe PID 984 wrote to memory of 1120 984 ucucb.exe taskhost.exe PID 984 wrote to memory of 1120 984 ucucb.exe taskhost.exe PID 984 wrote to memory of 1120 984 ucucb.exe taskhost.exe PID 984 wrote to memory of 1120 984 ucucb.exe taskhost.exe PID 984 wrote to memory of 1120 984 ucucb.exe taskhost.exe PID 984 wrote to memory of 1184 984 ucucb.exe Dwm.exe PID 984 wrote to memory of 1184 984 ucucb.exe Dwm.exe PID 984 wrote to memory of 1184 984 ucucb.exe Dwm.exe PID 984 wrote to memory of 1184 984 ucucb.exe Dwm.exe PID 984 wrote to memory of 1184 984 ucucb.exe Dwm.exe PID 984 wrote to memory of 1248 984 ucucb.exe Explorer.EXE PID 984 wrote to memory of 1248 984 ucucb.exe Explorer.EXE PID 984 wrote to memory of 1248 984 ucucb.exe Explorer.EXE PID 984 wrote to memory of 1248 984 ucucb.exe Explorer.EXE PID 984 wrote to memory of 1248 984 ucucb.exe Explorer.EXE PID 984 wrote to memory of 1064 984 ucucb.exe 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe PID 984 wrote to memory of 1064 984 ucucb.exe 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe PID 984 wrote to memory of 1064 984 ucucb.exe 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe PID 984 wrote to memory of 1064 984 ucucb.exe 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe PID 984 wrote to memory of 1064 984 ucucb.exe 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe PID 1064 wrote to memory of 652 1064 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe cmd.exe PID 1064 wrote to memory of 652 1064 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe cmd.exe PID 1064 wrote to memory of 652 1064 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe cmd.exe PID 1064 wrote to memory of 652 1064 755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe cmd.exe PID 984 wrote to memory of 652 984 ucucb.exe cmd.exe PID 984 wrote to memory of 652 984 ucucb.exe cmd.exe PID 984 wrote to memory of 652 984 ucucb.exe cmd.exe PID 984 wrote to memory of 652 984 ucucb.exe cmd.exe PID 984 wrote to memory of 652 984 ucucb.exe cmd.exe PID 984 wrote to memory of 992 984 ucucb.exe DllHost.exe PID 984 wrote to memory of 992 984 ucucb.exe DllHost.exe PID 984 wrote to memory of 992 984 ucucb.exe DllHost.exe PID 984 wrote to memory of 992 984 ucucb.exe DllHost.exe PID 984 wrote to memory of 992 984 ucucb.exe DllHost.exe PID 984 wrote to memory of 976 984 ucucb.exe DllHost.exe PID 984 wrote to memory of 976 984 ucucb.exe DllHost.exe PID 984 wrote to memory of 976 984 ucucb.exe DllHost.exe PID 984 wrote to memory of 976 984 ucucb.exe DllHost.exe PID 984 wrote to memory of 976 984 ucucb.exe DllHost.exe PID 984 wrote to memory of 1752 984 ucucb.exe DllHost.exe PID 984 wrote to memory of 1752 984 ucucb.exe DllHost.exe PID 984 wrote to memory of 1752 984 ucucb.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe"C:\Users\Admin\AppData\Local\Temp\755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe"C:\Users\Admin\AppData\Local\Temp\755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Roaming\Miafy\ucucb.exe"C:\Users\Admin\AppData\Roaming\Miafy\ucucb.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Roaming\Miafy\ucucb.exe"C:\Users\Admin\AppData\Roaming\Miafy\ucucb.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc6c43aaa.bat"4⤵
- Deletes itself
PID:652
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:992
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:976
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5dfd76ee500143a34379ec835777f02c6
SHA1e755ee78a6113076ff36b55ad2428a1a692e16d7
SHA25646e3d5594e3db6460f60c3eb8e2290a138da98bc9bad582c33bc6ad6d8543d16
SHA512b59290f5c47de10333a4f6fd9e40f47db68f793cfbdb745722f1fbd8c1cef20f31066a031b64f6177f41ca20aafb79b5abaee4c4a818bed4d3b6bb9d4d095de0
-
Filesize
256KB
MD5f097b2045ba3b8fb2a928d2e33b1126e
SHA1dd937fc009a99f059d5ff3ef6dab6e718dd8e7ca
SHA2567b8cc3c8830d287b2899128b061420b8569c68bc4dd9386c9855cdda0481f9a3
SHA512bb7942a8e7dccae775cbacdb4831ca9f5aa36f77fc8020a9aec93887ee0f466d2df9c4b1595565172869395eed1aa3d2090390af2fd93c9580fd13dbe9423962
-
Filesize
256KB
MD5f097b2045ba3b8fb2a928d2e33b1126e
SHA1dd937fc009a99f059d5ff3ef6dab6e718dd8e7ca
SHA2567b8cc3c8830d287b2899128b061420b8569c68bc4dd9386c9855cdda0481f9a3
SHA512bb7942a8e7dccae775cbacdb4831ca9f5aa36f77fc8020a9aec93887ee0f466d2df9c4b1595565172869395eed1aa3d2090390af2fd93c9580fd13dbe9423962
-
Filesize
256KB
MD5f097b2045ba3b8fb2a928d2e33b1126e
SHA1dd937fc009a99f059d5ff3ef6dab6e718dd8e7ca
SHA2567b8cc3c8830d287b2899128b061420b8569c68bc4dd9386c9855cdda0481f9a3
SHA512bb7942a8e7dccae775cbacdb4831ca9f5aa36f77fc8020a9aec93887ee0f466d2df9c4b1595565172869395eed1aa3d2090390af2fd93c9580fd13dbe9423962
-
Filesize
256KB
MD5f097b2045ba3b8fb2a928d2e33b1126e
SHA1dd937fc009a99f059d5ff3ef6dab6e718dd8e7ca
SHA2567b8cc3c8830d287b2899128b061420b8569c68bc4dd9386c9855cdda0481f9a3
SHA512bb7942a8e7dccae775cbacdb4831ca9f5aa36f77fc8020a9aec93887ee0f466d2df9c4b1595565172869395eed1aa3d2090390af2fd93c9580fd13dbe9423962
-
Filesize
256KB
MD5f097b2045ba3b8fb2a928d2e33b1126e
SHA1dd937fc009a99f059d5ff3ef6dab6e718dd8e7ca
SHA2567b8cc3c8830d287b2899128b061420b8569c68bc4dd9386c9855cdda0481f9a3
SHA512bb7942a8e7dccae775cbacdb4831ca9f5aa36f77fc8020a9aec93887ee0f466d2df9c4b1595565172869395eed1aa3d2090390af2fd93c9580fd13dbe9423962