Analysis
-
max time kernel
152s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 00:39
Static task
static1
Behavioral task
behavioral1
Sample
da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe
Resource
win10v2004-20220901-en
General
-
Target
da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe
-
Size
359KB
-
MD5
d87348fea9f73f3eb70cfaa85be58e1f
-
SHA1
0cd52b8d8908c2554388c771821e62d628105704
-
SHA256
da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69
-
SHA512
f85978289b435b1bc8a3789b0c2507a450fe256570fc87562c995fe523f6e323d6cc1283d339b9c8cd1cb5e5263aacd1afa1950141b96b778deb308b9d6a626a
-
SSDEEP
6144:E3Dk4W2GD/XQ9u/xUffWkMk4T5iup7blk2k7uEcldPlLWAfTfb9btTm:AcD/XQA/Wnb65lJgk9yAy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1400 uriht.exe -
Deletes itself 1 IoCs
pid Process 1488 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run uriht.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7BD94DA8-4FEF-AD4D-5225-887A4931AB67} = "C:\\Users\\Admin\\AppData\\Roaming\\Ocifwe\\uriht.exe" uriht.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 576 set thread context of 1488 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe 29 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe 1400 uriht.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe 1400 uriht.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 576 wrote to memory of 1400 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe 28 PID 576 wrote to memory of 1400 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe 28 PID 576 wrote to memory of 1400 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe 28 PID 576 wrote to memory of 1400 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe 28 PID 1400 wrote to memory of 1216 1400 uriht.exe 17 PID 1400 wrote to memory of 1216 1400 uriht.exe 17 PID 1400 wrote to memory of 1216 1400 uriht.exe 17 PID 1400 wrote to memory of 1216 1400 uriht.exe 17 PID 1400 wrote to memory of 1216 1400 uriht.exe 17 PID 1400 wrote to memory of 1296 1400 uriht.exe 9 PID 1400 wrote to memory of 1296 1400 uriht.exe 9 PID 1400 wrote to memory of 1296 1400 uriht.exe 9 PID 1400 wrote to memory of 1296 1400 uriht.exe 9 PID 1400 wrote to memory of 1296 1400 uriht.exe 9 PID 1400 wrote to memory of 1376 1400 uriht.exe 16 PID 1400 wrote to memory of 1376 1400 uriht.exe 16 PID 1400 wrote to memory of 1376 1400 uriht.exe 16 PID 1400 wrote to memory of 1376 1400 uriht.exe 16 PID 1400 wrote to memory of 1376 1400 uriht.exe 16 PID 1400 wrote to memory of 576 1400 uriht.exe 19 PID 1400 wrote to memory of 576 1400 uriht.exe 19 PID 1400 wrote to memory of 576 1400 uriht.exe 19 PID 1400 wrote to memory of 576 1400 uriht.exe 19 PID 1400 wrote to memory of 576 1400 uriht.exe 19 PID 576 wrote to memory of 1488 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe 29 PID 576 wrote to memory of 1488 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe 29 PID 576 wrote to memory of 1488 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe 29 PID 576 wrote to memory of 1488 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe 29 PID 576 wrote to memory of 1488 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe 29 PID 576 wrote to memory of 1488 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe 29 PID 576 wrote to memory of 1488 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe 29 PID 576 wrote to memory of 1488 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe 29 PID 576 wrote to memory of 1488 576 da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe 29
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1296
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe"C:\Users\Admin\AppData\Local\Temp\da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Roaming\Ocifwe\uriht.exe"C:\Users\Admin\AppData\Roaming\Ocifwe\uriht.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1400
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp888970da.bat"3⤵
- Deletes itself
PID:1488
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5e933872b3e523e0bf7dec317cb269b70
SHA150a644a47524e1e2bc82093bcf0e5aaddfd4d516
SHA25665d30da5f94ba8fd9047b24a015732a6697d712820303ebdb2400db01c79f4d3
SHA51246d584bdadd64dbe99ddb630fbe1ef2da6036f1e71f37f79401f1370e1d74b2889ee0d975ac0bcee73e4981ebc8514d6315e837307c1edebf5302de4d3674395
-
Filesize
359KB
MD5c43eefda125f51ecdd03f5bfd67678de
SHA19f080f2966214311ab1cba2e29c201d0ba8fc061
SHA25673971769a8700ea3f076d3a43d702adc49e8a3e7f8ecbfa2d10f5675a2f560ec
SHA512b78e517a5915f6f6b38670ced263c71ebb68b161b84afd693731c86d26de40f3a7214eeb991faf62d39bffa67dd5902e7eba0dd64826c3e8691f119648bf1d6d
-
Filesize
359KB
MD5c43eefda125f51ecdd03f5bfd67678de
SHA19f080f2966214311ab1cba2e29c201d0ba8fc061
SHA25673971769a8700ea3f076d3a43d702adc49e8a3e7f8ecbfa2d10f5675a2f560ec
SHA512b78e517a5915f6f6b38670ced263c71ebb68b161b84afd693731c86d26de40f3a7214eeb991faf62d39bffa67dd5902e7eba0dd64826c3e8691f119648bf1d6d
-
Filesize
359KB
MD5c43eefda125f51ecdd03f5bfd67678de
SHA19f080f2966214311ab1cba2e29c201d0ba8fc061
SHA25673971769a8700ea3f076d3a43d702adc49e8a3e7f8ecbfa2d10f5675a2f560ec
SHA512b78e517a5915f6f6b38670ced263c71ebb68b161b84afd693731c86d26de40f3a7214eeb991faf62d39bffa67dd5902e7eba0dd64826c3e8691f119648bf1d6d