Analysis
-
max time kernel
150s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe
Resource
win10v2004-20220812-en
General
-
Target
57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe
-
Size
454KB
-
MD5
23a6dcd59e3002ed0943c7db1b7c8f73
-
SHA1
14593e793ad0bb14251da90481d53001885e3bc8
-
SHA256
57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f
-
SHA512
3a13205f47fd1a202451af1cb49d4037a62f0784f2f6c5e0639d1900b8df064abb5a15dba9fa7b637d37611d71013dfd37d37489d6a586f6f581b02882743ffc
-
SSDEEP
6144:o2Kgo6ZWWeTfIE11KjyU5GUvvbwN+r+hOeG5FQGUP3ExX:o96ZWWwIEvKr5GfNMeG5Sk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2380 Uwwq3RDx.exe 2132 Uwwq3RDx.exe -
Loads dropped DLL 4 IoCs
pid Process 4364 57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe 4364 57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe 2132 Uwwq3RDx.exe 2132 Uwwq3RDx.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run 57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a5P8qGvIVsVnrPQ = "C:\\ProgramData\\A1qyFgzVppp1bYb\\Uwwq3RDx.exe" 57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4736 set thread context of 4364 4736 57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe 80 PID 2380 set thread context of 2132 2380 Uwwq3RDx.exe 82 PID 2132 set thread context of 2192 2132 Uwwq3RDx.exe 83 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4736 wrote to memory of 4364 4736 57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe 80 PID 4736 wrote to memory of 4364 4736 57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe 80 PID 4736 wrote to memory of 4364 4736 57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe 80 PID 4736 wrote to memory of 4364 4736 57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe 80 PID 4736 wrote to memory of 4364 4736 57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe 80 PID 4364 wrote to memory of 2380 4364 57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe 81 PID 4364 wrote to memory of 2380 4364 57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe 81 PID 4364 wrote to memory of 2380 4364 57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe 81 PID 2380 wrote to memory of 2132 2380 Uwwq3RDx.exe 82 PID 2380 wrote to memory of 2132 2380 Uwwq3RDx.exe 82 PID 2380 wrote to memory of 2132 2380 Uwwq3RDx.exe 82 PID 2380 wrote to memory of 2132 2380 Uwwq3RDx.exe 82 PID 2380 wrote to memory of 2132 2380 Uwwq3RDx.exe 82 PID 2132 wrote to memory of 2192 2132 Uwwq3RDx.exe 83 PID 2132 wrote to memory of 2192 2132 Uwwq3RDx.exe 83 PID 2132 wrote to memory of 2192 2132 Uwwq3RDx.exe 83 PID 2132 wrote to memory of 2192 2132 Uwwq3RDx.exe 83 PID 2132 wrote to memory of 2192 2132 Uwwq3RDx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe"C:\Users\Admin\AppData\Local\Temp\57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe"C:\Users\Admin\AppData\Local\Temp\57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\ProgramData\A1qyFgzVppp1bYb\Uwwq3RDx.exe"C:\ProgramData\A1qyFgzVppp1bYb\Uwwq3RDx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\ProgramData\A1qyFgzVppp1bYb\Uwwq3RDx.exe"C:\ProgramData\A1qyFgzVppp1bYb\Uwwq3RDx.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe" /i:21325⤵PID:2192
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
454KB
MD523a6dcd59e3002ed0943c7db1b7c8f73
SHA114593e793ad0bb14251da90481d53001885e3bc8
SHA25657f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f
SHA5123a13205f47fd1a202451af1cb49d4037a62f0784f2f6c5e0639d1900b8df064abb5a15dba9fa7b637d37611d71013dfd37d37489d6a586f6f581b02882743ffc
-
Filesize
454KB
MD523a6dcd59e3002ed0943c7db1b7c8f73
SHA114593e793ad0bb14251da90481d53001885e3bc8
SHA25657f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f
SHA5123a13205f47fd1a202451af1cb49d4037a62f0784f2f6c5e0639d1900b8df064abb5a15dba9fa7b637d37611d71013dfd37d37489d6a586f6f581b02882743ffc
-
Filesize
454KB
MD5f1c449862b61e963a24f2c5091ae2a2d
SHA10ccb10c7d735104da9e3e9e5e2cb62de7d1f0a28
SHA256a186cb9c429cbe4b394b94769112da80b37530d1cd2f7ea98e74ecef52e7150f
SHA5123ddcda41e79347088dda9829f4d6c3fd09618e6bce625b9f163f4d6f057d99028939a0b87a905c8624709e106ff4f479426731210326281df6d14601aca35dd6
-
Filesize
454KB
MD5f1c449862b61e963a24f2c5091ae2a2d
SHA10ccb10c7d735104da9e3e9e5e2cb62de7d1f0a28
SHA256a186cb9c429cbe4b394b94769112da80b37530d1cd2f7ea98e74ecef52e7150f
SHA5123ddcda41e79347088dda9829f4d6c3fd09618e6bce625b9f163f4d6f057d99028939a0b87a905c8624709e106ff4f479426731210326281df6d14601aca35dd6
-
Filesize
454KB
MD5f1c449862b61e963a24f2c5091ae2a2d
SHA10ccb10c7d735104da9e3e9e5e2cb62de7d1f0a28
SHA256a186cb9c429cbe4b394b94769112da80b37530d1cd2f7ea98e74ecef52e7150f
SHA5123ddcda41e79347088dda9829f4d6c3fd09618e6bce625b9f163f4d6f057d99028939a0b87a905c8624709e106ff4f479426731210326281df6d14601aca35dd6
-
Filesize
454KB
MD5f1c449862b61e963a24f2c5091ae2a2d
SHA10ccb10c7d735104da9e3e9e5e2cb62de7d1f0a28
SHA256a186cb9c429cbe4b394b94769112da80b37530d1cd2f7ea98e74ecef52e7150f
SHA5123ddcda41e79347088dda9829f4d6c3fd09618e6bce625b9f163f4d6f057d99028939a0b87a905c8624709e106ff4f479426731210326281df6d14601aca35dd6
-
Filesize
454KB
MD5f1c449862b61e963a24f2c5091ae2a2d
SHA10ccb10c7d735104da9e3e9e5e2cb62de7d1f0a28
SHA256a186cb9c429cbe4b394b94769112da80b37530d1cd2f7ea98e74ecef52e7150f
SHA5123ddcda41e79347088dda9829f4d6c3fd09618e6bce625b9f163f4d6f057d99028939a0b87a905c8624709e106ff4f479426731210326281df6d14601aca35dd6