Analysis
-
max time kernel
191s -
max time network
224s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 15:29
Static task
static1
Behavioral task
behavioral1
Sample
304d2fc82e2398804364c5b2da3fe43ed9a3f5581883134f4b2ac68ec76326d3.exe
Resource
win7-20220901-en
General
-
Target
304d2fc82e2398804364c5b2da3fe43ed9a3f5581883134f4b2ac68ec76326d3.exe
-
Size
163KB
-
MD5
07c48efec256157d37cfad4f429050f6
-
SHA1
95ee9560e06a1b7f6ca2e88c3a86987d3fcc5b1e
-
SHA256
304d2fc82e2398804364c5b2da3fe43ed9a3f5581883134f4b2ac68ec76326d3
-
SHA512
a47fc8d88e0cf03382db2e1a5d194834fa7e6add376402fbac4b5ca46bc6de06e4ff8ee1a605e209a0cc3a16d3b498bfa2fb2d2b00c8b1cd7d8a6b8d16d816ac
-
SSDEEP
3072:VbeMh5pve3qP87Lp56bkqe5WfSCQ5I7HWYLS4dt1f3RaNewDDp:V35pm3w87MkqeISCgIjBLS4v1paLDp
Malware Config
Extracted
systembc
89.248.163.218:443
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
uwxs.exepid process 876 uwxs.exe -
Drops file in Windows directory 2 IoCs
Processes:
304d2fc82e2398804364c5b2da3fe43ed9a3f5581883134f4b2ac68ec76326d3.exedescription ioc process File created C:\Windows\Tasks\uwxs.job 304d2fc82e2398804364c5b2da3fe43ed9a3f5581883134f4b2ac68ec76326d3.exe File opened for modification C:\Windows\Tasks\uwxs.job 304d2fc82e2398804364c5b2da3fe43ed9a3f5581883134f4b2ac68ec76326d3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
304d2fc82e2398804364c5b2da3fe43ed9a3f5581883134f4b2ac68ec76326d3.exepid process 3328 304d2fc82e2398804364c5b2da3fe43ed9a3f5581883134f4b2ac68ec76326d3.exe 3328 304d2fc82e2398804364c5b2da3fe43ed9a3f5581883134f4b2ac68ec76326d3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\304d2fc82e2398804364c5b2da3fe43ed9a3f5581883134f4b2ac68ec76326d3.exe"C:\Users\Admin\AppData\Local\Temp\304d2fc82e2398804364c5b2da3fe43ed9a3f5581883134f4b2ac68ec76326d3.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3328
-
C:\ProgramData\gqxxc\uwxs.exeC:\ProgramData\gqxxc\uwxs.exe start1⤵
- Executes dropped EXE
PID:876
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD507c48efec256157d37cfad4f429050f6
SHA195ee9560e06a1b7f6ca2e88c3a86987d3fcc5b1e
SHA256304d2fc82e2398804364c5b2da3fe43ed9a3f5581883134f4b2ac68ec76326d3
SHA512a47fc8d88e0cf03382db2e1a5d194834fa7e6add376402fbac4b5ca46bc6de06e4ff8ee1a605e209a0cc3a16d3b498bfa2fb2d2b00c8b1cd7d8a6b8d16d816ac
-
Filesize
163KB
MD507c48efec256157d37cfad4f429050f6
SHA195ee9560e06a1b7f6ca2e88c3a86987d3fcc5b1e
SHA256304d2fc82e2398804364c5b2da3fe43ed9a3f5581883134f4b2ac68ec76326d3
SHA512a47fc8d88e0cf03382db2e1a5d194834fa7e6add376402fbac4b5ca46bc6de06e4ff8ee1a605e209a0cc3a16d3b498bfa2fb2d2b00c8b1cd7d8a6b8d16d816ac