Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 07:39
Static task
static1
Behavioral task
behavioral1
Sample
ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358.exe
Resource
win10v2004-20220901-en
General
-
Target
ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358.exe
-
Size
35KB
-
MD5
f130b4c9581f47752a681a26a075dd76
-
SHA1
009260394b204bcd3f91fbe625ee3f56c18ac6ef
-
SHA256
ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358
-
SHA512
3da397eaaf755a7279b93ca4a9e4c265370e71df8b64ba12ba3939a6f219a5c7dbba56a90d6a1a062d99b1ba6ad1e8e1002b0cb367602a05af78355578e1e660
-
SSDEEP
768:CpgQf0M/6vzzzzzzzzzzzzzzzzzzzzzzzzzzzz2yyHpj+:CphX6vzzzzzzzzzzzzzzzzzzzzzzzzz7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
uaygf.exepid process 1792 uaygf.exe -
Deletes itself 1 IoCs
Processes:
uaygf.exepid process 1792 uaygf.exe -
Loads dropped DLL 2 IoCs
Processes:
ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358.exepid process 1796 ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358.exe 1796 ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358.exedescription pid process target process PID 1796 wrote to memory of 1792 1796 ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358.exe uaygf.exe PID 1796 wrote to memory of 1792 1796 ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358.exe uaygf.exe PID 1796 wrote to memory of 1792 1796 ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358.exe uaygf.exe PID 1796 wrote to memory of 1792 1796 ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358.exe uaygf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358.exe"C:\Users\Admin\AppData\Local\Temp\ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\uaygf.exeC:\Users\Admin\AppData\Local\Temp\uaygf.exe2⤵
- Executes dropped EXE
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\uaygf.exeFilesize
35KB
MD5f130b4c9581f47752a681a26a075dd76
SHA1009260394b204bcd3f91fbe625ee3f56c18ac6ef
SHA256ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358
SHA5123da397eaaf755a7279b93ca4a9e4c265370e71df8b64ba12ba3939a6f219a5c7dbba56a90d6a1a062d99b1ba6ad1e8e1002b0cb367602a05af78355578e1e660
-
C:\Users\Admin\AppData\Local\Temp\uaygf.exeFilesize
35KB
MD5f130b4c9581f47752a681a26a075dd76
SHA1009260394b204bcd3f91fbe625ee3f56c18ac6ef
SHA256ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358
SHA5123da397eaaf755a7279b93ca4a9e4c265370e71df8b64ba12ba3939a6f219a5c7dbba56a90d6a1a062d99b1ba6ad1e8e1002b0cb367602a05af78355578e1e660
-
C:\Users\Admin\AppData\Local\Temp\utt2ED4.tmpFilesize
206B
MD590e0dc7c414069be4ce015718e030ba3
SHA14284067a74b8d579e55cf6ecdd7c7237f1dc5186
SHA256597d081c22d6967ffdf1f145e606df5e2f9a81e8b40c43ac0ef3bd3302acdd2e
SHA512137c6ede06069f12821464ae9cd56c4eb667cf9a52585bd849d3c2dbb7367d860a59a8b69885263ce929d861bc356cc492a6166779875db2ed56d19e305ae814
-
\Users\Admin\AppData\Local\Temp\uaygf.exeFilesize
35KB
MD5f130b4c9581f47752a681a26a075dd76
SHA1009260394b204bcd3f91fbe625ee3f56c18ac6ef
SHA256ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358
SHA5123da397eaaf755a7279b93ca4a9e4c265370e71df8b64ba12ba3939a6f219a5c7dbba56a90d6a1a062d99b1ba6ad1e8e1002b0cb367602a05af78355578e1e660
-
\Users\Admin\AppData\Local\Temp\uaygf.exeFilesize
35KB
MD5f130b4c9581f47752a681a26a075dd76
SHA1009260394b204bcd3f91fbe625ee3f56c18ac6ef
SHA256ef0717bce91c868c367b3bbac22a28fe4ec72a230ec96ae646cb76a850ec6358
SHA5123da397eaaf755a7279b93ca4a9e4c265370e71df8b64ba12ba3939a6f219a5c7dbba56a90d6a1a062d99b1ba6ad1e8e1002b0cb367602a05af78355578e1e660
-
memory/1792-57-0x0000000000000000-mapping.dmp
-
memory/1792-62-0x0000000000270000-0x0000000000294000-memory.dmpFilesize
144KB
-
memory/1792-63-0x0000000000270000-0x0000000000294000-memory.dmpFilesize
144KB
-
memory/1796-54-0x00000000760A1000-0x00000000760A3000-memory.dmpFilesize
8KB