Analysis
-
max time kernel
151s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 23:18
Behavioral task
behavioral1
Sample
ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe
Resource
win10v2004-20220901-en
General
-
Target
ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe
-
Size
238KB
-
MD5
da0d379af51fd10a8ca99b7ff84b2779
-
SHA1
97ba43eba04bda9ff3067f12f282bae22afbc62d
-
SHA256
ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7
-
SHA512
d3ef568950f5f201b134ac7de139ae053233aac76788fa8ea6fd83317d55100c473647774ee482f6525785420deb4b880ba1d747590d3905486cdc3d786e4235
-
SSDEEP
6144:5oSk2d/iP1FMxld3qac3TMfKC3XSTKGXylljag8dj:5oSk2d/iYld323TKFGX+BaHdj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1732 ager.exe 660 ager.exe -
resource yara_rule behavioral1/memory/1256-63-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x00080000000152c0-66.dat upx behavioral1/files/0x00080000000152c0-69.dat upx behavioral1/files/0x00080000000152c0-67.dat upx behavioral1/files/0x00080000000152c0-70.dat upx behavioral1/memory/1732-80-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x00080000000152c0-79.dat upx -
Deletes itself 1 IoCs
pid Process 1164 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1356 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 1356 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run ager.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\Currentversion\Run ager.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Roygpiicaz = "C:\\Users\\Admin\\AppData\\Roaming\\Ucfix\\ager.exe" ager.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1256 set thread context of 1356 1256 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 26 PID 1732 set thread context of 660 1732 ager.exe 28 -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe 660 ager.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1356 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe Token: SeSecurityPrivilege 1356 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1356 1256 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 26 PID 1256 wrote to memory of 1356 1256 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 26 PID 1256 wrote to memory of 1356 1256 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 26 PID 1256 wrote to memory of 1356 1256 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 26 PID 1256 wrote to memory of 1356 1256 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 26 PID 1256 wrote to memory of 1356 1256 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 26 PID 1256 wrote to memory of 1356 1256 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 26 PID 1256 wrote to memory of 1356 1256 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 26 PID 1256 wrote to memory of 1356 1256 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 26 PID 1356 wrote to memory of 1732 1356 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 27 PID 1356 wrote to memory of 1732 1356 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 27 PID 1356 wrote to memory of 1732 1356 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 27 PID 1356 wrote to memory of 1732 1356 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 27 PID 1732 wrote to memory of 660 1732 ager.exe 28 PID 1732 wrote to memory of 660 1732 ager.exe 28 PID 1732 wrote to memory of 660 1732 ager.exe 28 PID 1732 wrote to memory of 660 1732 ager.exe 28 PID 1732 wrote to memory of 660 1732 ager.exe 28 PID 1732 wrote to memory of 660 1732 ager.exe 28 PID 1732 wrote to memory of 660 1732 ager.exe 28 PID 1732 wrote to memory of 660 1732 ager.exe 28 PID 1732 wrote to memory of 660 1732 ager.exe 28 PID 1356 wrote to memory of 1164 1356 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 29 PID 1356 wrote to memory of 1164 1356 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 29 PID 1356 wrote to memory of 1164 1356 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 29 PID 1356 wrote to memory of 1164 1356 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 29 PID 660 wrote to memory of 1124 660 ager.exe 14 PID 660 wrote to memory of 1124 660 ager.exe 14 PID 660 wrote to memory of 1124 660 ager.exe 14 PID 660 wrote to memory of 1124 660 ager.exe 14 PID 660 wrote to memory of 1124 660 ager.exe 14 PID 660 wrote to memory of 1184 660 ager.exe 13 PID 660 wrote to memory of 1184 660 ager.exe 13 PID 660 wrote to memory of 1184 660 ager.exe 13 PID 660 wrote to memory of 1184 660 ager.exe 13 PID 660 wrote to memory of 1184 660 ager.exe 13 PID 660 wrote to memory of 1240 660 ager.exe 8 PID 660 wrote to memory of 1240 660 ager.exe 8 PID 660 wrote to memory of 1240 660 ager.exe 8 PID 660 wrote to memory of 1240 660 ager.exe 8 PID 660 wrote to memory of 1240 660 ager.exe 8 PID 660 wrote to memory of 1148 660 ager.exe 31 PID 660 wrote to memory of 1148 660 ager.exe 31 PID 660 wrote to memory of 1148 660 ager.exe 31 PID 660 wrote to memory of 1148 660 ager.exe 31 PID 660 wrote to memory of 1148 660 ager.exe 31 PID 660 wrote to memory of 1924 660 ager.exe 32 PID 660 wrote to memory of 1924 660 ager.exe 32 PID 660 wrote to memory of 1924 660 ager.exe 32 PID 660 wrote to memory of 1924 660 ager.exe 32 PID 660 wrote to memory of 1924 660 ager.exe 32 PID 660 wrote to memory of 892 660 ager.exe 33 PID 660 wrote to memory of 892 660 ager.exe 33 PID 660 wrote to memory of 892 660 ager.exe 33 PID 660 wrote to memory of 892 660 ager.exe 33 PID 660 wrote to memory of 892 660 ager.exe 33 PID 660 wrote to memory of 1932 660 ager.exe 34 PID 660 wrote to memory of 1932 660 ager.exe 34 PID 660 wrote to memory of 1932 660 ager.exe 34 PID 660 wrote to memory of 1932 660 ager.exe 34 PID 660 wrote to memory of 1932 660 ager.exe 34 PID 660 wrote to memory of 1912 660 ager.exe 35 PID 660 wrote to memory of 1912 660 ager.exe 35 PID 660 wrote to memory of 1912 660 ager.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe"C:\Users\Admin\AppData\Local\Temp\ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1256 -
\??\c:\users\admin\appdata\local\temp\ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe"c:\users\admin\appdata\local\temp\ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Roaming\Ucfix\ager.exe"C:\Users\Admin\AppData\Roaming\Ucfix\ager.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1732 -
\??\c:\users\admin\appdata\roaming\ucfix\ager.exe"c:\users\admin\appdata\roaming\ucfix\ager.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc12a7397.bat"4⤵
- Deletes itself
PID:1164
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1148
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1924
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:892
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1932
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1912
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1708
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1064
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5d7f082d106810c25c2d43566d97c203d
SHA1f35c03898c02d2b410f579806f05ef8f7bcfc1e9
SHA25683f11481d1e79733e4b41d751e14624bcce85361bec2def3858d4d11572eb79d
SHA512ca49a15ff75ae893b0a1b6ac6223751afd0ab75fcee2c474a6909ed9ffe8fc66bcc5406575adedf5ec835f037e7840ccea75f09985bdf5787ccaa58b5b6a166e
-
Filesize
238KB
MD597ea0c6bf4b9a7d6ea1ff8f2eb787b5a
SHA190b93dc193d59abd109e455f38193122989491ae
SHA25686a53108143a233bcbb2b72087aa0d587dcd494e1f58ddad5c0c0c30ce73410e
SHA512fb3e1ddbc5ab69c1caa29e280fddd91aca428ec295b4d3a1bbbea12612fa614fb2440fa7822c87fbe1cb76e2e30716fc449ee4a95582004a5b554d61f17b0861
-
Filesize
238KB
MD597ea0c6bf4b9a7d6ea1ff8f2eb787b5a
SHA190b93dc193d59abd109e455f38193122989491ae
SHA25686a53108143a233bcbb2b72087aa0d587dcd494e1f58ddad5c0c0c30ce73410e
SHA512fb3e1ddbc5ab69c1caa29e280fddd91aca428ec295b4d3a1bbbea12612fa614fb2440fa7822c87fbe1cb76e2e30716fc449ee4a95582004a5b554d61f17b0861
-
Filesize
238KB
MD597ea0c6bf4b9a7d6ea1ff8f2eb787b5a
SHA190b93dc193d59abd109e455f38193122989491ae
SHA25686a53108143a233bcbb2b72087aa0d587dcd494e1f58ddad5c0c0c30ce73410e
SHA512fb3e1ddbc5ab69c1caa29e280fddd91aca428ec295b4d3a1bbbea12612fa614fb2440fa7822c87fbe1cb76e2e30716fc449ee4a95582004a5b554d61f17b0861
-
Filesize
238KB
MD597ea0c6bf4b9a7d6ea1ff8f2eb787b5a
SHA190b93dc193d59abd109e455f38193122989491ae
SHA25686a53108143a233bcbb2b72087aa0d587dcd494e1f58ddad5c0c0c30ce73410e
SHA512fb3e1ddbc5ab69c1caa29e280fddd91aca428ec295b4d3a1bbbea12612fa614fb2440fa7822c87fbe1cb76e2e30716fc449ee4a95582004a5b554d61f17b0861
-
Filesize
238KB
MD597ea0c6bf4b9a7d6ea1ff8f2eb787b5a
SHA190b93dc193d59abd109e455f38193122989491ae
SHA25686a53108143a233bcbb2b72087aa0d587dcd494e1f58ddad5c0c0c30ce73410e
SHA512fb3e1ddbc5ab69c1caa29e280fddd91aca428ec295b4d3a1bbbea12612fa614fb2440fa7822c87fbe1cb76e2e30716fc449ee4a95582004a5b554d61f17b0861