Analysis
-
max time kernel
69s -
max time network
286s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
25-11-2022 22:19
Behavioral task
behavioral1
Sample
fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.exe
Resource
win7-20221111-en
General
-
Target
fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.exe
-
Size
5.4MB
-
MD5
610a076f83218b51b01a24e9c8eba3ae
-
SHA1
7956cbd49823b35362f2244a350078f066873e65
-
SHA256
fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08
-
SHA512
bed36d4f8663e1c3e9b877367b64a2bf0ae95a86da0c02d74b29872137f370f8419359be2244e009039705f64d68eb9792dee7dd4ed1456bc54789c1ca82c707
-
SSDEEP
98304:InGmlwPwuBvk1wu8JZfB7QJYfUbNM9VlE/V3VydE18wkcUrL5iKroh9Q4QGn7MO:InGmlgwgM18JPvCIU3V/+rLr29QUMO
Malware Config
Extracted
laplas
clipper.guru
-
api_key
e967005093020788056c9d94da04435883edc18212f0de012679a229f024fdb6
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
udakqMngIV.exepid process 1300 udakqMngIV.exe -
Processes:
resource yara_rule behavioral2/memory/1980-126-0x0000000001090000-0x0000000001C63000-memory.dmp vmprotect C:\Users\Admin\AppData\Roaming\DSPHwkOpIx\udakqMngIV.exe vmprotect C:\Users\Admin\AppData\Roaming\DSPHwkOpIx\udakqMngIV.exe vmprotect behavioral2/memory/1300-184-0x0000000000B80000-0x0000000001753000-memory.dmp vmprotect -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 7 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.execmd.exedescription pid process target process PID 1980 wrote to memory of 3484 1980 fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.exe cmd.exe PID 1980 wrote to memory of 3484 1980 fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.exe cmd.exe PID 1980 wrote to memory of 3484 1980 fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.exe cmd.exe PID 3484 wrote to memory of 2188 3484 cmd.exe schtasks.exe PID 3484 wrote to memory of 2188 3484 cmd.exe schtasks.exe PID 3484 wrote to memory of 2188 3484 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.exe"C:\Users\Admin\AppData\Local\Temp\fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /create /tn DSPHwkOpIx /tr C:\Users\Admin\AppData\Roaming\DSPHwkOpIx\udakqMngIV.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn DSPHwkOpIx /tr C:\Users\Admin\AppData\Roaming\DSPHwkOpIx\udakqMngIV.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵
- Creates scheduled task(s)
PID:2188
-
-
-
C:\Users\Admin\AppData\Roaming\DSPHwkOpIx\udakqMngIV.exeC:\Users\Admin\AppData\Roaming\DSPHwkOpIx\udakqMngIV.exe1⤵
- Executes dropped EXE
PID:1300
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
715.8MB
MD5bd098ef3580a51c7a3f77693e4fd51bc
SHA1ba28a368f62a6fcc484017431c67d889e47320a1
SHA2561a89d3d0db738b4540fe0f74dbb9c6ab336ecbbd937741e7b3fb3d5cdb4e82db
SHA5121068f966d512a7cbb4925f31b10843990489c85558f054043d411872aee131b14d64628238c7713d34b82f4819b250ce5e3a8bab3c098d7378ce067de7af1c60
-
Filesize
715.8MB
MD5bd098ef3580a51c7a3f77693e4fd51bc
SHA1ba28a368f62a6fcc484017431c67d889e47320a1
SHA2561a89d3d0db738b4540fe0f74dbb9c6ab336ecbbd937741e7b3fb3d5cdb4e82db
SHA5121068f966d512a7cbb4925f31b10843990489c85558f054043d411872aee131b14d64628238c7713d34b82f4819b250ce5e3a8bab3c098d7378ce067de7af1c60