Analysis
-
max time kernel
81s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
26-11-2022 22:23
Behavioral task
behavioral1
Sample
fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.exe
Resource
win7-20221111-en
General
-
Target
fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.exe
-
Size
5.4MB
-
MD5
610a076f83218b51b01a24e9c8eba3ae
-
SHA1
7956cbd49823b35362f2244a350078f066873e65
-
SHA256
fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08
-
SHA512
bed36d4f8663e1c3e9b877367b64a2bf0ae95a86da0c02d74b29872137f370f8419359be2244e009039705f64d68eb9792dee7dd4ed1456bc54789c1ca82c707
-
SSDEEP
98304:InGmlwPwuBvk1wu8JZfB7QJYfUbNM9VlE/V3VydE18wkcUrL5iKroh9Q4QGn7MO:InGmlgwgM18JPvCIU3V/+rLr29QUMO
Malware Config
Extracted
laplas
clipper.guru
-
api_key
e967005093020788056c9d94da04435883edc18212f0de012679a229f024fdb6
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
udakqMngIV.exepid process 1340 udakqMngIV.exe -
Processes:
resource yara_rule behavioral2/memory/4748-126-0x00000000009A0000-0x0000000001573000-memory.dmp vmprotect C:\Users\Admin\AppData\Roaming\DSPHwkOpIx\udakqMngIV.exe vmprotect C:\Users\Admin\AppData\Roaming\DSPHwkOpIx\udakqMngIV.exe vmprotect behavioral2/memory/1340-184-0x0000000000D10000-0x00000000018E3000-memory.dmp vmprotect -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 8 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.execmd.exedescription pid process target process PID 4748 wrote to memory of 4372 4748 fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.exe cmd.exe PID 4748 wrote to memory of 4372 4748 fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.exe cmd.exe PID 4748 wrote to memory of 4372 4748 fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.exe cmd.exe PID 4372 wrote to memory of 2824 4372 cmd.exe schtasks.exe PID 4372 wrote to memory of 2824 4372 cmd.exe schtasks.exe PID 4372 wrote to memory of 2824 4372 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.exe"C:\Users\Admin\AppData\Local\Temp\fc06eb8ba18242f5a2dfb76d80ca1fe30e8df12f7c5f3d0092eb3d7fd4d51f08.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /create /tn DSPHwkOpIx /tr C:\Users\Admin\AppData\Roaming\DSPHwkOpIx\udakqMngIV.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn DSPHwkOpIx /tr C:\Users\Admin\AppData\Roaming\DSPHwkOpIx\udakqMngIV.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵
- Creates scheduled task(s)
PID:2824
-
-
-
C:\Users\Admin\AppData\Roaming\DSPHwkOpIx\udakqMngIV.exeC:\Users\Admin\AppData\Roaming\DSPHwkOpIx\udakqMngIV.exe1⤵
- Executes dropped EXE
PID:1340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
665.4MB
MD5f0474feae9c54e5539ef6d36ce2f49e2
SHA1247faffb5206dd1cb052dfa43bc0d243541496ba
SHA25624cba3f64419a69eaa6e7831b2f34a410fe761e3324cc995f51fb41aaac73743
SHA51230a22c138f53673729e279c3472b6527140651872103546440a8d2bcabbf5025ac3f837a2d7f0eb1d995468f589071c0a5ddaa76408fc0899a367b636f623768
-
Filesize
665.4MB
MD5f0474feae9c54e5539ef6d36ce2f49e2
SHA1247faffb5206dd1cb052dfa43bc0d243541496ba
SHA25624cba3f64419a69eaa6e7831b2f34a410fe761e3324cc995f51fb41aaac73743
SHA51230a22c138f53673729e279c3472b6527140651872103546440a8d2bcabbf5025ac3f837a2d7f0eb1d995468f589071c0a5ddaa76408fc0899a367b636f623768