Analysis
-
max time kernel
188s -
max time network
224s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 05:18
Static task
static1
Behavioral task
behavioral1
Sample
c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe
Resource
win10v2004-20221111-en
General
-
Target
c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe
-
Size
221KB
-
MD5
979aca3a0e5a1f06d2266be262ff9130
-
SHA1
40472f7573cc91313fcd3f025959d8c8c67ab1dd
-
SHA256
c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261
-
SHA512
f54c07383f1244779f93d94a354e97f921224e849e99e2ecc39b6a9e504dfea42fb4c85b4c634f720fe844d2b231edee4a772b7b2c6d79e1a7fbd34c8db3806c
-
SSDEEP
3072:zXT8bOA9OxjMGBg5xah9p06qDRoZ32BktfDI+0STbjXPa5QqnnhSiOuzcspefC:3A81Bg50pjmBKXpbjXrWnhauUfC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 340 ofeh.exe -
Loads dropped DLL 2 IoCs
pid Process 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\Currentversion\Run ofeh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Meabexas = "C:\\Users\\Admin\\AppData\\Roaming\\Usatug\\ofeh.exe" ofeh.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 952 set thread context of 1760 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeSecurityPrivilege 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe Token: SeSecurityPrivilege 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe Token: SeSecurityPrivilege 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe Token: SeSecurityPrivilege 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe Token: SeSecurityPrivilege 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe Token: SeSecurityPrivilege 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe 340 ofeh.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 952 wrote to memory of 340 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 28 PID 952 wrote to memory of 340 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 28 PID 952 wrote to memory of 340 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 28 PID 952 wrote to memory of 340 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 28 PID 340 wrote to memory of 1176 340 ofeh.exe 11 PID 340 wrote to memory of 1176 340 ofeh.exe 11 PID 340 wrote to memory of 1176 340 ofeh.exe 11 PID 340 wrote to memory of 1176 340 ofeh.exe 11 PID 340 wrote to memory of 1176 340 ofeh.exe 11 PID 340 wrote to memory of 1276 340 ofeh.exe 10 PID 340 wrote to memory of 1276 340 ofeh.exe 10 PID 340 wrote to memory of 1276 340 ofeh.exe 10 PID 340 wrote to memory of 1276 340 ofeh.exe 10 PID 340 wrote to memory of 1276 340 ofeh.exe 10 PID 340 wrote to memory of 1312 340 ofeh.exe 9 PID 340 wrote to memory of 1312 340 ofeh.exe 9 PID 340 wrote to memory of 1312 340 ofeh.exe 9 PID 340 wrote to memory of 1312 340 ofeh.exe 9 PID 340 wrote to memory of 1312 340 ofeh.exe 9 PID 340 wrote to memory of 952 340 ofeh.exe 8 PID 340 wrote to memory of 952 340 ofeh.exe 8 PID 340 wrote to memory of 952 340 ofeh.exe 8 PID 340 wrote to memory of 952 340 ofeh.exe 8 PID 340 wrote to memory of 952 340 ofeh.exe 8 PID 952 wrote to memory of 1760 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 29 PID 952 wrote to memory of 1760 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 29 PID 952 wrote to memory of 1760 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 29 PID 952 wrote to memory of 1760 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 29 PID 952 wrote to memory of 1760 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 29 PID 952 wrote to memory of 1760 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 29 PID 952 wrote to memory of 1760 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 29 PID 952 wrote to memory of 1760 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 29 PID 952 wrote to memory of 1760 952 c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe 29 PID 340 wrote to memory of 1252 340 ofeh.exe 30 PID 340 wrote to memory of 1252 340 ofeh.exe 30 PID 340 wrote to memory of 1252 340 ofeh.exe 30 PID 340 wrote to memory of 1252 340 ofeh.exe 30 PID 340 wrote to memory of 1252 340 ofeh.exe 30 PID 340 wrote to memory of 1948 340 ofeh.exe 31 PID 340 wrote to memory of 1948 340 ofeh.exe 31 PID 340 wrote to memory of 1948 340 ofeh.exe 31 PID 340 wrote to memory of 1948 340 ofeh.exe 31 PID 340 wrote to memory of 1948 340 ofeh.exe 31 PID 340 wrote to memory of 2040 340 ofeh.exe 32 PID 340 wrote to memory of 2040 340 ofeh.exe 32 PID 340 wrote to memory of 2040 340 ofeh.exe 32 PID 340 wrote to memory of 2040 340 ofeh.exe 32 PID 340 wrote to memory of 2040 340 ofeh.exe 32 PID 340 wrote to memory of 844 340 ofeh.exe 33 PID 340 wrote to memory of 844 340 ofeh.exe 33 PID 340 wrote to memory of 844 340 ofeh.exe 33 PID 340 wrote to memory of 844 340 ofeh.exe 33 PID 340 wrote to memory of 844 340 ofeh.exe 33 PID 340 wrote to memory of 1976 340 ofeh.exe 34 PID 340 wrote to memory of 1976 340 ofeh.exe 34 PID 340 wrote to memory of 1976 340 ofeh.exe 34 PID 340 wrote to memory of 1976 340 ofeh.exe 34 PID 340 wrote to memory of 1976 340 ofeh.exe 34 PID 340 wrote to memory of 628 340 ofeh.exe 35 PID 340 wrote to memory of 628 340 ofeh.exe 35 PID 340 wrote to memory of 628 340 ofeh.exe 35 PID 340 wrote to memory of 628 340 ofeh.exe 35 PID 340 wrote to memory of 628 340 ofeh.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe"C:\Users\Admin\AppData\Local\Temp\c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Roaming\Usatug\ofeh.exe"C:\Users\Admin\AppData\Roaming\Usatug\ofeh.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:340
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8e5ab766.bat"2⤵PID:1760
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1312
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1276
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1176
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1252
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1934140490-6625278351248190404-20203295-12574983751843041061-14749818861261163745"1⤵PID:1948
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2040
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:844
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1976
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f208d079203fa1c734edc0450c35ee77
SHA194db3901124e1592dab6b5e74ee6f77af966e641
SHA256fc7e1e10a692e5c50bddaef9c8b43a786256ce689f6f133763385aae658138ce
SHA512fe261f20ffe5f88d8df2bc1026e9444dee375013d143878a904203403c82ad063f04307bc9987ac1eea4c77cc4178a3087cb402af135af78e58bdb198d7e2d85
-
Filesize
221KB
MD542a63ae58ed2757989489881b585ec8d
SHA13dc9a09bd8ff9d7494c19016a4f33cc8eb1c4f2f
SHA25678f832070301a5ffbd0658319f8bf53f016d35c90893526749b34aacdb32873f
SHA512cee3453655bb1d27f3a7918712614a6747fd46cb797b3c433b059e92c60cd5f4e470fd3e2fc79457d433f4d5d75fa608727fccda806a41efa088b84958df46c8
-
Filesize
221KB
MD542a63ae58ed2757989489881b585ec8d
SHA13dc9a09bd8ff9d7494c19016a4f33cc8eb1c4f2f
SHA25678f832070301a5ffbd0658319f8bf53f016d35c90893526749b34aacdb32873f
SHA512cee3453655bb1d27f3a7918712614a6747fd46cb797b3c433b059e92c60cd5f4e470fd3e2fc79457d433f4d5d75fa608727fccda806a41efa088b84958df46c8
-
Filesize
221KB
MD542a63ae58ed2757989489881b585ec8d
SHA13dc9a09bd8ff9d7494c19016a4f33cc8eb1c4f2f
SHA25678f832070301a5ffbd0658319f8bf53f016d35c90893526749b34aacdb32873f
SHA512cee3453655bb1d27f3a7918712614a6747fd46cb797b3c433b059e92c60cd5f4e470fd3e2fc79457d433f4d5d75fa608727fccda806a41efa088b84958df46c8
-
Filesize
221KB
MD542a63ae58ed2757989489881b585ec8d
SHA13dc9a09bd8ff9d7494c19016a4f33cc8eb1c4f2f
SHA25678f832070301a5ffbd0658319f8bf53f016d35c90893526749b34aacdb32873f
SHA512cee3453655bb1d27f3a7918712614a6747fd46cb797b3c433b059e92c60cd5f4e470fd3e2fc79457d433f4d5d75fa608727fccda806a41efa088b84958df46c8