Analysis
-
max time kernel
150s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe
Resource
win10v2004-20220901-en
General
-
Target
3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe
-
Size
308KB
-
MD5
3aedd07b5a621303e9bcac44e105e790
-
SHA1
5df7beee07fcadc576cc2c65b523d1044248aa0c
-
SHA256
3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7
-
SHA512
4cf6b92d1379f721d3f1145434fa6d5a0e07ee3c6f3ed97a9e642b4fce5ffe74557b6cf137e60bf10b0498a3e2dc1603ee7c2190dcddfcaef504a19cc26d90a6
-
SSDEEP
6144:b8LqykcP+wbqVi4/9xQu95WE+FB4gWOw69aY+2GHTrbJW6N3cGyf3Yim:b8Lqy7Jb0i47QWu1WOw6WPHTrbY6NMFU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1708 fulua.exe -
Deletes itself 1 IoCs
pid Process 1108 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fulua = "C:\\Users\\Admin\\AppData\\Roaming\\Owyf\\fulua.exe" fulua.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run fulua.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 960 set thread context of 1108 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe 29 -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1708 fulua.exe 1708 fulua.exe 1708 fulua.exe 1708 fulua.exe 1708 fulua.exe 1708 fulua.exe 1708 fulua.exe 1708 fulua.exe 1708 fulua.exe 1708 fulua.exe 1708 fulua.exe 1708 fulua.exe 1708 fulua.exe 1708 fulua.exe 1708 fulua.exe 1708 fulua.exe 1708 fulua.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 960 wrote to memory of 1708 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe 28 PID 960 wrote to memory of 1708 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe 28 PID 960 wrote to memory of 1708 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe 28 PID 960 wrote to memory of 1708 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe 28 PID 1708 wrote to memory of 1232 1708 fulua.exe 17 PID 1708 wrote to memory of 1232 1708 fulua.exe 17 PID 1708 wrote to memory of 1232 1708 fulua.exe 17 PID 1708 wrote to memory of 1232 1708 fulua.exe 17 PID 1708 wrote to memory of 1232 1708 fulua.exe 17 PID 1708 wrote to memory of 1320 1708 fulua.exe 16 PID 1708 wrote to memory of 1320 1708 fulua.exe 16 PID 1708 wrote to memory of 1320 1708 fulua.exe 16 PID 1708 wrote to memory of 1320 1708 fulua.exe 16 PID 1708 wrote to memory of 1320 1708 fulua.exe 16 PID 1708 wrote to memory of 1384 1708 fulua.exe 15 PID 1708 wrote to memory of 1384 1708 fulua.exe 15 PID 1708 wrote to memory of 1384 1708 fulua.exe 15 PID 1708 wrote to memory of 1384 1708 fulua.exe 15 PID 1708 wrote to memory of 1384 1708 fulua.exe 15 PID 1708 wrote to memory of 960 1708 fulua.exe 18 PID 1708 wrote to memory of 960 1708 fulua.exe 18 PID 1708 wrote to memory of 960 1708 fulua.exe 18 PID 1708 wrote to memory of 960 1708 fulua.exe 18 PID 1708 wrote to memory of 960 1708 fulua.exe 18 PID 960 wrote to memory of 1108 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe 29 PID 960 wrote to memory of 1108 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe 29 PID 960 wrote to memory of 1108 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe 29 PID 960 wrote to memory of 1108 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe 29 PID 960 wrote to memory of 1108 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe 29 PID 960 wrote to memory of 1108 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe 29 PID 960 wrote to memory of 1108 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe 29 PID 960 wrote to memory of 1108 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe 29 PID 960 wrote to memory of 1108 960 3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe"C:\Users\Admin\AppData\Local\Temp\3cf2e34b103edd62a351317a531a48c26207863e8306eecb97cc53cf392ef2d7.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Roaming\Owyf\fulua.exe"C:\Users\Admin\AppData\Roaming\Owyf\fulua.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\AGLE249.bat"3⤵
- Deletes itself
PID:1108
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1320
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD53b1e94d0b9828155934525cf40abfe53
SHA1cf86c597d7221f04cccbf51939291f795cad7686
SHA256308129b690fd8b060ff76cdab2a1eb2b87bb756d438df54ed84e85810904b30e
SHA5127b011628ea8713b44e05586600c2d814936701a3fa270b3db19a92b7c151a900b3280e514ef24e473abe40ed8289645ddceefec2ed56f82815df5070ded8a37a
-
Filesize
308KB
MD524993d8ed529e199a4cc61f6ca2ed1df
SHA10e2cc986c482e889415e75b286b3be99d0590a2f
SHA2569cf453cb4bcf67263349eaf34bf20e5d854b1f39194f3d90b5bc12db69319b80
SHA512c0144a86c35a651c24ebffca0d6794d7a1fed1895ef1f459433da2e4691ff290c451760d1c0ff65d4833003073b1c6e1eb7eaa8d4a6024721f9200a1dc009734
-
Filesize
308KB
MD524993d8ed529e199a4cc61f6ca2ed1df
SHA10e2cc986c482e889415e75b286b3be99d0590a2f
SHA2569cf453cb4bcf67263349eaf34bf20e5d854b1f39194f3d90b5bc12db69319b80
SHA512c0144a86c35a651c24ebffca0d6794d7a1fed1895ef1f459433da2e4691ff290c451760d1c0ff65d4833003073b1c6e1eb7eaa8d4a6024721f9200a1dc009734
-
Filesize
308KB
MD524993d8ed529e199a4cc61f6ca2ed1df
SHA10e2cc986c482e889415e75b286b3be99d0590a2f
SHA2569cf453cb4bcf67263349eaf34bf20e5d854b1f39194f3d90b5bc12db69319b80
SHA512c0144a86c35a651c24ebffca0d6794d7a1fed1895ef1f459433da2e4691ff290c451760d1c0ff65d4833003073b1c6e1eb7eaa8d4a6024721f9200a1dc009734
-
Filesize
308KB
MD524993d8ed529e199a4cc61f6ca2ed1df
SHA10e2cc986c482e889415e75b286b3be99d0590a2f
SHA2569cf453cb4bcf67263349eaf34bf20e5d854b1f39194f3d90b5bc12db69319b80
SHA512c0144a86c35a651c24ebffca0d6794d7a1fed1895ef1f459433da2e4691ff290c451760d1c0ff65d4833003073b1c6e1eb7eaa8d4a6024721f9200a1dc009734