Analysis
-
max time kernel
151s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 18:01
Static task
static1
Behavioral task
behavioral1
Sample
ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe
Resource
win10v2004-20220812-en
General
-
Target
ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe
-
Size
1.1MB
-
MD5
1243a29740ecb429476b44651cc29408
-
SHA1
11581943aae80fbe3c9f7841372f6864b0cea90f
-
SHA256
ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb
-
SHA512
34f94e0bda8c907466f08d186d07c2bb86fe86ffbd1830ef1ff0871ad6d913d19daa734266a25498172133cc4adfbd82c782cfe385b20bc04b035cef3cd8e141
-
SSDEEP
24576:st24ofv5yEEbW0+pNPKqZilRAu7IXmF+OSgLpz4T3eJGi:WonbEtEVKmu7q8cT3zi
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 540 ucabc.cmd 1932 ucabc.cmd -
Loads dropped DLL 5 IoCs
pid Process 1536 ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe 1536 ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe 1536 ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe 1536 ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe 540 ucabc.cmd -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ucabc.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\dktog\\ucabc.cmd C:\\Users\\Admin\\AppData\\Roaming\\dktog\\apewn.rmb" ucabc.cmd -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1932 set thread context of 1976 1932 ucabc.cmd 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1976 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1976 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1976 RegSvcs.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1536 wrote to memory of 540 1536 ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe 26 PID 1536 wrote to memory of 540 1536 ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe 26 PID 1536 wrote to memory of 540 1536 ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe 26 PID 1536 wrote to memory of 540 1536 ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe 26 PID 1536 wrote to memory of 540 1536 ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe 26 PID 1536 wrote to memory of 540 1536 ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe 26 PID 1536 wrote to memory of 540 1536 ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe 26 PID 540 wrote to memory of 1932 540 ucabc.cmd 27 PID 540 wrote to memory of 1932 540 ucabc.cmd 27 PID 540 wrote to memory of 1932 540 ucabc.cmd 27 PID 540 wrote to memory of 1932 540 ucabc.cmd 27 PID 540 wrote to memory of 1932 540 ucabc.cmd 27 PID 540 wrote to memory of 1932 540 ucabc.cmd 27 PID 540 wrote to memory of 1932 540 ucabc.cmd 27 PID 1932 wrote to memory of 1976 1932 ucabc.cmd 28 PID 1932 wrote to memory of 1976 1932 ucabc.cmd 28 PID 1932 wrote to memory of 1976 1932 ucabc.cmd 28 PID 1932 wrote to memory of 1976 1932 ucabc.cmd 28 PID 1932 wrote to memory of 1976 1932 ucabc.cmd 28 PID 1932 wrote to memory of 1976 1932 ucabc.cmd 28 PID 1932 wrote to memory of 1976 1932 ucabc.cmd 28 PID 1932 wrote to memory of 1976 1932 ucabc.cmd 28 PID 1932 wrote to memory of 1976 1932 ucabc.cmd 28 PID 1932 wrote to memory of 1976 1932 ucabc.cmd 28 PID 1932 wrote to memory of 1976 1932 ucabc.cmd 28 PID 1932 wrote to memory of 1976 1932 ucabc.cmd 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe"C:\Users\Admin\AppData\Local\Temp\ee485630c7d062d58cda6b5cf11375bff1ba8137a7bac5965645f0f2c6b8d0bb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Roaming\dktog\ucabc.cmd"C:\Users\Admin\AppData\Roaming\dktog\ucabc.cmd" apewn.rmb2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Roaming\dktog\ucabc.cmdC:\Users\Admin\AppData\Roaming\dktog\ucabc.cmd C:\Users\Admin\AppData\Roaming\dktog\ELYKJ3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"4⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1976
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD526b4a17150fd293003f10de5e27585b8
SHA159a4e7426526b0a18158b4163eed8e2d5a2561d6
SHA256082b41f71cc5a5118e1f70f49e059763d48fc072e7fc28f8efb11076537461f3
SHA512231ae48c34ae97d14b0205ee7dcf7c04cb37f222647a8e5c449d230a538c92be10d1783bb398b0e28e845de6b5eb4060ade962927f7aa92dca18edeb4cc6723f
-
Filesize
27KB
MD5d42742b4154180ecf6f1f62a71d6f15d
SHA124dcdb5dd4364e3d252f2fd3c5dbd5fba6a0f539
SHA2563078f9138b6f2bd60f902e1c97632b839cf6442f589c90ecff11b87d414f2e50
SHA5125cc112f7d94b4b6087d996057d0c2d201f1354c55db3ecc615989ef61f5b5acffb3dd8287e130a7e6ac56badc88e0e1636ce41b24c6887e98ac78a14693dcdc9
-
Filesize
87KB
MD5a20e7d261e3641103f188d51cf43fe03
SHA145c07be82aeb3d3618ac46a6888ebd091b6becfc
SHA256ff0614327ed94a008255d1f8544472a7196a2d13e57deee926c7c39662ecf855
SHA512399ab2aa66c55f35c654d217a321bf551a5fb6a6a9404f3348dacdf7dc62b4545807d32be6d0fc223f7911f23e1b8929e5d62e994e394b58804d44b3c946b12e
-
Filesize
117KB
MD5031ba0b27c27a92e747ca922a4762821
SHA1e29f098643f9f4431f12790fc302a636a806463e
SHA256403b59b76a47f76f7ebe2b99e311609bfbdd76917fb95479750774853fc30a85
SHA512e1f0ce3e1929ff6cb771e19a9f5e1c40a908e260435973d5f4ef58463b5df0e77cc9427b8d24082f94acbbaa406c54a7bbf010bf50969db67432a3504b066f17
-
Filesize
271KB
MD5447de2b6246f434182293a78954480ef
SHA18395ab6d0c70a38ae20ea2ee37b235470189d80b
SHA2568ecdfcaad18e2d2d1a9e614e25df8d76bd5910a90c843acfecd2a97640c51f60
SHA512df4c9d29201a7dfda38e55307bd203ea419bd34936950a4a0689bf2b9263958ff7d19dd8073199445eff7a268d84b34de74e853f0d999b7816cabbeb285510c4
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59