Analysis
-
max time kernel
187s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 02:12
Static task
static1
Behavioral task
behavioral1
Sample
76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe
Resource
win10v2004-20221111-en
General
-
Target
76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe
-
Size
298KB
-
MD5
829e0ad3103a281fd798f2df793dd39b
-
SHA1
f83e690b914331f59915d5ff3f290431dc0dcbd2
-
SHA256
76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de
-
SHA512
c90527b600f15215ebebdc4b208a6ae758bb662894e24ae7c9c69ea64fa4c1b21f52448ae389662def170f62e2752ce3f980349495771155d8129b57fca25b3a
-
SSDEEP
6144:FQ8uksvUGxVVeDa0t8EYkJECEMnj05RoWfvh8EybgjmT72bA22g9:O8KVVeDaZEL7/joRoDjUhA2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
urhuci.exepid process 1052 urhuci.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 532 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exepid process 1700 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
urhuci.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run urhuci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{A87A45C8-3774-AD4D-8524-3978BFBA1A65} = "C:\\Users\\Admin\\AppData\\Roaming\\Xaevze\\urhuci.exe" urhuci.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exedescription pid process target process PID 1700 set thread context of 532 1700 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe cmd.exe -
Processes:
76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
urhuci.exepid process 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe 1052 urhuci.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exeurhuci.exedescription pid process target process PID 1700 wrote to memory of 1052 1700 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe urhuci.exe PID 1700 wrote to memory of 1052 1700 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe urhuci.exe PID 1700 wrote to memory of 1052 1700 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe urhuci.exe PID 1700 wrote to memory of 1052 1700 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe urhuci.exe PID 1052 wrote to memory of 1132 1052 urhuci.exe taskhost.exe PID 1052 wrote to memory of 1132 1052 urhuci.exe taskhost.exe PID 1052 wrote to memory of 1132 1052 urhuci.exe taskhost.exe PID 1052 wrote to memory of 1132 1052 urhuci.exe taskhost.exe PID 1052 wrote to memory of 1132 1052 urhuci.exe taskhost.exe PID 1052 wrote to memory of 1236 1052 urhuci.exe Dwm.exe PID 1052 wrote to memory of 1236 1052 urhuci.exe Dwm.exe PID 1052 wrote to memory of 1236 1052 urhuci.exe Dwm.exe PID 1052 wrote to memory of 1236 1052 urhuci.exe Dwm.exe PID 1052 wrote to memory of 1236 1052 urhuci.exe Dwm.exe PID 1052 wrote to memory of 1280 1052 urhuci.exe Explorer.EXE PID 1052 wrote to memory of 1280 1052 urhuci.exe Explorer.EXE PID 1052 wrote to memory of 1280 1052 urhuci.exe Explorer.EXE PID 1052 wrote to memory of 1280 1052 urhuci.exe Explorer.EXE PID 1052 wrote to memory of 1280 1052 urhuci.exe Explorer.EXE PID 1052 wrote to memory of 1700 1052 urhuci.exe 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe PID 1052 wrote to memory of 1700 1052 urhuci.exe 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe PID 1052 wrote to memory of 1700 1052 urhuci.exe 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe PID 1052 wrote to memory of 1700 1052 urhuci.exe 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe PID 1052 wrote to memory of 1700 1052 urhuci.exe 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe PID 1700 wrote to memory of 532 1700 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe cmd.exe PID 1700 wrote to memory of 532 1700 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe cmd.exe PID 1700 wrote to memory of 532 1700 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe cmd.exe PID 1700 wrote to memory of 532 1700 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe cmd.exe PID 1700 wrote to memory of 532 1700 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe cmd.exe PID 1700 wrote to memory of 532 1700 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe cmd.exe PID 1700 wrote to memory of 532 1700 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe cmd.exe PID 1700 wrote to memory of 532 1700 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe cmd.exe PID 1700 wrote to memory of 532 1700 76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe cmd.exe PID 1052 wrote to memory of 292 1052 urhuci.exe conhost.exe PID 1052 wrote to memory of 292 1052 urhuci.exe conhost.exe PID 1052 wrote to memory of 292 1052 urhuci.exe conhost.exe PID 1052 wrote to memory of 292 1052 urhuci.exe conhost.exe PID 1052 wrote to memory of 292 1052 urhuci.exe conhost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe"C:\Users\Admin\AppData\Local\Temp\76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Roaming\Xaevze\urhuci.exe"C:\Users\Admin\AppData\Roaming\Xaevze\urhuci.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1052
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd8140db2.bat"3⤵
- Deletes itself
PID:532
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1236
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1426104846-633057510195175572413762642061728105048-62111946473986701217889130"1⤵PID:292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
466B
MD56bc4b222ad5ccbff5630ff07f346628b
SHA1224d32c228e6f001b48e87473cfb7405cc99ebbb
SHA256657ff4c67a7e52eec19d54dd91e012ac21cda0ca52432e8396b9477389317ef8
SHA5120f0ae62cd985aec728ab5fa8ed0216de2766431803203cf0537d3b203e12a2c0d32816dcd44714701aa11278747d21c77af25c4809280ae73e9cc65ed1a22665
-
Filesize
307B
MD5acab2e63d86c44c01b1b74c6ef29ed18
SHA17184bac771517053a35423920ddb20e85d41a0ba
SHA25627912755ac2951d3a2702b0b1094051897dc2e88387371f010885386249bbd84
SHA51237472aa622e566e5f68c8d007f80f8d71702f25152fadb1b368d1665b0b329fafd919ab6d40fda0ac20a50fc8fc3e2eccd91af77d6c5c91da5308d0148a4e5cc
-
Filesize
298KB
MD557698a19712ac4525579041c532cf936
SHA18a3d4f07bd2f344d6cb327c14df8d4805b728dcb
SHA25694ecfed1738a3061e0319752cb35b6dcc8890eaf1d10f0d138f598e83174f216
SHA5124a74f0b07cb94155673cacce63f1586b53c343b3bb4c1a991c4db2a149b5b5d6ec687b74332418cfa920095d8979f0d425c5d13cee4db240cd80067ac6a01e27
-
Filesize
298KB
MD557698a19712ac4525579041c532cf936
SHA18a3d4f07bd2f344d6cb327c14df8d4805b728dcb
SHA25694ecfed1738a3061e0319752cb35b6dcc8890eaf1d10f0d138f598e83174f216
SHA5124a74f0b07cb94155673cacce63f1586b53c343b3bb4c1a991c4db2a149b5b5d6ec687b74332418cfa920095d8979f0d425c5d13cee4db240cd80067ac6a01e27
-
Filesize
298KB
MD557698a19712ac4525579041c532cf936
SHA18a3d4f07bd2f344d6cb327c14df8d4805b728dcb
SHA25694ecfed1738a3061e0319752cb35b6dcc8890eaf1d10f0d138f598e83174f216
SHA5124a74f0b07cb94155673cacce63f1586b53c343b3bb4c1a991c4db2a149b5b5d6ec687b74332418cfa920095d8979f0d425c5d13cee4db240cd80067ac6a01e27