Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 17:22
Static task
static1
Behavioral task
behavioral1
Sample
56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe
Resource
win10v2004-20220901-en
General
-
Target
56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe
-
Size
359KB
-
MD5
78ea828e9434fbe1ca631f2d812bb603
-
SHA1
6d24bb6271b60926a2842060f4cca46900833d5f
-
SHA256
56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b
-
SHA512
a19127383ba86e6a649bbd076b88e31167841797b00b2b95a82332f520db998e319dfb4f7edfc18908cf3f1ce26b3332a1e9530d1fe137aabdbadba4911408fe
-
SSDEEP
6144:03lgk4W2GD/X1ku/xUffWkMk4T5iup7blk2k7uEcldPlLWAfTfb90tTU:VcD/X1//Wnb65lJgk9yAh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1724 uzwyma.exe -
Deletes itself 1 IoCs
pid Process 1272 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run uzwyma.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7BD94DA8-4FEF-AD4D-5225-887A4931AB67} = "C:\\Users\\Admin\\AppData\\Roaming\\Aceqe\\uzwyma.exe" uzwyma.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1972 set thread context of 1272 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe 29 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe 1724 uzwyma.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe 1724 uzwyma.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1724 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe 28 PID 1972 wrote to memory of 1724 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe 28 PID 1972 wrote to memory of 1724 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe 28 PID 1972 wrote to memory of 1724 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe 28 PID 1724 wrote to memory of 1116 1724 uzwyma.exe 16 PID 1724 wrote to memory of 1116 1724 uzwyma.exe 16 PID 1724 wrote to memory of 1116 1724 uzwyma.exe 16 PID 1724 wrote to memory of 1116 1724 uzwyma.exe 16 PID 1724 wrote to memory of 1116 1724 uzwyma.exe 16 PID 1724 wrote to memory of 1188 1724 uzwyma.exe 15 PID 1724 wrote to memory of 1188 1724 uzwyma.exe 15 PID 1724 wrote to memory of 1188 1724 uzwyma.exe 15 PID 1724 wrote to memory of 1188 1724 uzwyma.exe 15 PID 1724 wrote to memory of 1188 1724 uzwyma.exe 15 PID 1724 wrote to memory of 1216 1724 uzwyma.exe 14 PID 1724 wrote to memory of 1216 1724 uzwyma.exe 14 PID 1724 wrote to memory of 1216 1724 uzwyma.exe 14 PID 1724 wrote to memory of 1216 1724 uzwyma.exe 14 PID 1724 wrote to memory of 1216 1724 uzwyma.exe 14 PID 1724 wrote to memory of 1972 1724 uzwyma.exe 19 PID 1724 wrote to memory of 1972 1724 uzwyma.exe 19 PID 1724 wrote to memory of 1972 1724 uzwyma.exe 19 PID 1724 wrote to memory of 1972 1724 uzwyma.exe 19 PID 1724 wrote to memory of 1972 1724 uzwyma.exe 19 PID 1972 wrote to memory of 1272 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe 29 PID 1972 wrote to memory of 1272 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe 29 PID 1972 wrote to memory of 1272 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe 29 PID 1972 wrote to memory of 1272 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe 29 PID 1972 wrote to memory of 1272 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe 29 PID 1972 wrote to memory of 1272 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe 29 PID 1972 wrote to memory of 1272 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe 29 PID 1972 wrote to memory of 1272 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe 29 PID 1972 wrote to memory of 1272 1972 56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe"C:\Users\Admin\AppData\Local\Temp\56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Roaming\Aceqe\uzwyma.exe"C:\Users\Admin\AppData\Roaming\Aceqe\uzwyma.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1724
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp141446b4.bat"3⤵
- Deletes itself
PID:1272
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD51e196cf6a0e2741d4287aa52bc24f245
SHA1ab8296b7391990eb745d3e2b6f9a44946771332d
SHA2563c457c10990f929cfea6a5409eaf1e55122dafb7fd55d1d5011a092bf074cea8
SHA512f65328edc14295a53db4e24a40e2b048d59313e78ad03e6db6def6a233777f311f8d18d4238ffb1603424c5def4e6063f1a7f9b602e394ae5635109bc9551292
-
Filesize
359KB
MD5d91329da5c98f1bb5b48c5e535fcee6b
SHA1816987507e4304eef861caedf1c4d643967af0bf
SHA256d0056406260837dda666d89715e6980246727d28eeafceb2c5f05c625a6e1207
SHA51299d1f8a60fff7e8c68fdb77ba9d1cf86ec041b4212d4f48702f1ac738835dfb35a6eae48b12e185cdb9edeff722a77ba13094133b72ea30912c4f27170307f17
-
Filesize
359KB
MD5d91329da5c98f1bb5b48c5e535fcee6b
SHA1816987507e4304eef861caedf1c4d643967af0bf
SHA256d0056406260837dda666d89715e6980246727d28eeafceb2c5f05c625a6e1207
SHA51299d1f8a60fff7e8c68fdb77ba9d1cf86ec041b4212d4f48702f1ac738835dfb35a6eae48b12e185cdb9edeff722a77ba13094133b72ea30912c4f27170307f17
-
Filesize
359KB
MD5d91329da5c98f1bb5b48c5e535fcee6b
SHA1816987507e4304eef861caedf1c4d643967af0bf
SHA256d0056406260837dda666d89715e6980246727d28eeafceb2c5f05c625a6e1207
SHA51299d1f8a60fff7e8c68fdb77ba9d1cf86ec041b4212d4f48702f1ac738835dfb35a6eae48b12e185cdb9edeff722a77ba13094133b72ea30912c4f27170307f17