Analysis
-
max time kernel
151s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 05:11
Behavioral task
behavioral1
Sample
94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe
Resource
win10v2004-20221111-en
General
-
Target
94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe
-
Size
307KB
-
MD5
b476f73104bbe66c730e4b1052ee1acd
-
SHA1
5eaaadeeb1e70bf2d2be365e39adb2e6cbd55ea8
-
SHA256
94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0
-
SHA512
fdc343c7ad32d86583e5116fa5a20cc33d7c0d84df9ef1d0583c7ce4ec2539d4242ed241a02e28f1e7e6a49d2683a412ea4ad38ed03828dd98397ac6bb1e221b
-
SSDEEP
6144:2qz+T72Y0SnzinYKTY1SQshfRPVQe1MZkIYSccr7wbstO/PECYeixlYGicwP:2Cq7SSeYsY1UMqMZJYSN7wbstO/8fveR
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 1 IoCs
Processes:
uhwi.exepid process 828 uhwi.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1724 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exepid process 1552 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
uhwi.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run uhwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{A87A45C8-3774-AD4D-8524-3978BFBA1A65} = "C:\\Users\\Admin\\AppData\\Roaming\\Vaud\\uhwi.exe" uhwi.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exedescription pid process target process PID 1552 set thread context of 1724 1552 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe cmd.exe -
Processes:
94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
uhwi.exepid process 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe 828 uhwi.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exeuhwi.exedescription pid process target process PID 1552 wrote to memory of 828 1552 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe uhwi.exe PID 1552 wrote to memory of 828 1552 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe uhwi.exe PID 1552 wrote to memory of 828 1552 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe uhwi.exe PID 1552 wrote to memory of 828 1552 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe uhwi.exe PID 828 wrote to memory of 1140 828 uhwi.exe taskhost.exe PID 828 wrote to memory of 1140 828 uhwi.exe taskhost.exe PID 828 wrote to memory of 1140 828 uhwi.exe taskhost.exe PID 828 wrote to memory of 1140 828 uhwi.exe taskhost.exe PID 828 wrote to memory of 1140 828 uhwi.exe taskhost.exe PID 828 wrote to memory of 1228 828 uhwi.exe Dwm.exe PID 828 wrote to memory of 1228 828 uhwi.exe Dwm.exe PID 828 wrote to memory of 1228 828 uhwi.exe Dwm.exe PID 828 wrote to memory of 1228 828 uhwi.exe Dwm.exe PID 828 wrote to memory of 1228 828 uhwi.exe Dwm.exe PID 828 wrote to memory of 1284 828 uhwi.exe Explorer.EXE PID 828 wrote to memory of 1284 828 uhwi.exe Explorer.EXE PID 828 wrote to memory of 1284 828 uhwi.exe Explorer.EXE PID 828 wrote to memory of 1284 828 uhwi.exe Explorer.EXE PID 828 wrote to memory of 1284 828 uhwi.exe Explorer.EXE PID 828 wrote to memory of 1552 828 uhwi.exe 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe PID 828 wrote to memory of 1552 828 uhwi.exe 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe PID 828 wrote to memory of 1552 828 uhwi.exe 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe PID 828 wrote to memory of 1552 828 uhwi.exe 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe PID 828 wrote to memory of 1552 828 uhwi.exe 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe PID 1552 wrote to memory of 1724 1552 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe cmd.exe PID 1552 wrote to memory of 1724 1552 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe cmd.exe PID 1552 wrote to memory of 1724 1552 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe cmd.exe PID 1552 wrote to memory of 1724 1552 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe cmd.exe PID 1552 wrote to memory of 1724 1552 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe cmd.exe PID 1552 wrote to memory of 1724 1552 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe cmd.exe PID 1552 wrote to memory of 1724 1552 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe cmd.exe PID 1552 wrote to memory of 1724 1552 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe cmd.exe PID 1552 wrote to memory of 1724 1552 94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe"C:\Users\Admin\AppData\Local\Temp\94257457675302e788a4d7f9524ece51548630bf28221c4406c07057ba1d67f0.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Roaming\Vaud\uhwi.exe"C:\Users\Admin\AppData\Roaming\Vaud\uhwi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:828
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8a8e69ff.bat"3⤵
- Deletes itself
PID:1724
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1228
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD560cdd7d463708487f56a484f5711d983
SHA17de74adb3d60e016ac47589c5159af3d90155ba6
SHA2561e4909bad1a8e37eac604c65109a4ddd489328b431e2474a09080b2f4a9301c4
SHA512e64a9c0a41fc16128ab7123e58f0017e516c4a6c814afa18de43a5eee403236fc63e4079b32597ba20cd26b2b07f0344e47213e39cf1918e2d44e29825c0d505
-
Filesize
307KB
MD5ece49826c62210a73091bc79fda4e362
SHA1c2594ed4a0f67b7c22fee462f51024526f9cbdbc
SHA256456eb67ccc21b775b221900791f05b2209fdc4a39698eb857206e5641b89477c
SHA512762fb924fad974a87192fcaf8f95ef67c5426d98bfe306675b4ed5bf13b7eb409024dcfb142f9e27e3aa8bce25be9557cb05b239d484e1cb5cd46313eaf0f4bb
-
Filesize
307KB
MD5ece49826c62210a73091bc79fda4e362
SHA1c2594ed4a0f67b7c22fee462f51024526f9cbdbc
SHA256456eb67ccc21b775b221900791f05b2209fdc4a39698eb857206e5641b89477c
SHA512762fb924fad974a87192fcaf8f95ef67c5426d98bfe306675b4ed5bf13b7eb409024dcfb142f9e27e3aa8bce25be9557cb05b239d484e1cb5cd46313eaf0f4bb
-
Filesize
307KB
MD5ece49826c62210a73091bc79fda4e362
SHA1c2594ed4a0f67b7c22fee462f51024526f9cbdbc
SHA256456eb67ccc21b775b221900791f05b2209fdc4a39698eb857206e5641b89477c
SHA512762fb924fad974a87192fcaf8f95ef67c5426d98bfe306675b4ed5bf13b7eb409024dcfb142f9e27e3aa8bce25be9557cb05b239d484e1cb5cd46313eaf0f4bb