Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01/12/2022, 01:40
Static task
static1
General
-
Target
FileUploader.exe
-
Size
2.4MB
-
MD5
3524bf075483daee7600be10d7414630
-
SHA1
6f549661d0bad58ebe8cbcd62f3051bb09f5cf9e
-
SHA256
49e432a95d1f9046177075d1d567d9fdeabcb6754119fb36d94e3f70dd11487f
-
SHA512
37c1f1f090e9c2d569aac7cb05813c7415814c46b07659a779972237e350a542149586e16d80a74f45597d0adfe7c6f76fcb0595f70f679483c93b617867bf0c
-
SSDEEP
49152:ZPF6u4jPKBN2Y5UOulpM3MEgi7Ls5JyhGJFZBHDSt5E:lpY1Y5kf+M/i7Ls5JRSt5E
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3844 FileUploader.exe 3844 FileUploader.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FileUploader.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION FileUploader.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\FileUploader.exe = "11000" FileUploader.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe 3844 FileUploader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FileUploader.exe"C:\Users\Admin\AppData\Local\Temp\FileUploader.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5ca9c8994cea09980530702242c331a85
SHA11676a23f97b4a620a733e64b6cc5da4a902e3360
SHA256039b8b6fdc3e8a119812fd147c36b2a96424e7326371ca765cd6530429443e83
SHA512fddac03088ffc095f73274752bb6705bbef80f8d32b233edb86ecccddb4657b0d03531dcaebe4f8abe91cf6b286d3d0a187df307e13bbd41b22b7eb70de32592
-
Filesize
328KB
MD5605e7e2dd50d4cbabea235263f92996f
SHA1ac3caf0d640ce6b33a01f2a7fa76410f73e520bc
SHA2568b44b130bdaa368a31d54c1a73d5ca19dfb87d55ad0dc44494bf2a72a0f8a0c8
SHA51242be57764a8021140091a63108c879408a6899f4df1a53ecebdff67a955083edf61901d996f865e0f47a48272f17aa01a13221c568b8126bb321065214517c6a