Analysis
-
max time kernel
208s -
max time network
230s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe
Resource
win10v2004-20220812-en
General
-
Target
abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe
-
Size
56KB
-
MD5
0b8b17a617b6c205633b1ac80ecc3f5d
-
SHA1
2c6edcb78c8487cc46065580a31d3544e54328a7
-
SHA256
abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f
-
SHA512
3c081b8e01c1d0aba1ed679dbf4ca086facfdf4edaac51c90b24a43fea4f17ff5c43367bb4a95f01c5a28c4cb80fab2379be8a7578a77d665280ee883141a49a
-
SSDEEP
1536:ZwukcsdF0XR0YafoBsXJ+CW82hbI/K1uKDTlv9+u:qukddF6R5afWuL61TXiu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1800 einudpmgr.exe 2784 einudpmgr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows UDP Control Center = "einudpmgr.exe" abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2224 set thread context of 3160 2224 abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe 79 PID 1800 set thread context of 2784 1800 einudpmgr.exe 81 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\einudpmgr.exe abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe File opened for modification C:\Windows\einudpmgr.exe abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe File opened for modification C:\Windows\einudpmgr.exe einudpmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2224 abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe 1800 einudpmgr.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2224 wrote to memory of 3160 2224 abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe 79 PID 2224 wrote to memory of 3160 2224 abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe 79 PID 2224 wrote to memory of 3160 2224 abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe 79 PID 2224 wrote to memory of 3160 2224 abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe 79 PID 2224 wrote to memory of 3160 2224 abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe 79 PID 2224 wrote to memory of 3160 2224 abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe 79 PID 2224 wrote to memory of 3160 2224 abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe 79 PID 2224 wrote to memory of 3160 2224 abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe 79 PID 3160 wrote to memory of 1800 3160 abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe 80 PID 3160 wrote to memory of 1800 3160 abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe 80 PID 3160 wrote to memory of 1800 3160 abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe 80 PID 1800 wrote to memory of 2784 1800 einudpmgr.exe 81 PID 1800 wrote to memory of 2784 1800 einudpmgr.exe 81 PID 1800 wrote to memory of 2784 1800 einudpmgr.exe 81 PID 1800 wrote to memory of 2784 1800 einudpmgr.exe 81 PID 1800 wrote to memory of 2784 1800 einudpmgr.exe 81 PID 1800 wrote to memory of 2784 1800 einudpmgr.exe 81 PID 1800 wrote to memory of 2784 1800 einudpmgr.exe 81 PID 1800 wrote to memory of 2784 1800 einudpmgr.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe"C:\Users\Admin\AppData\Local\Temp\abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f.exe
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\einudpmgr.exe"C:\Windows\einudpmgr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\einudpmgr.exe
- Executes dropped EXE
PID:2784
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD50b8b17a617b6c205633b1ac80ecc3f5d
SHA12c6edcb78c8487cc46065580a31d3544e54328a7
SHA256abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f
SHA5123c081b8e01c1d0aba1ed679dbf4ca086facfdf4edaac51c90b24a43fea4f17ff5c43367bb4a95f01c5a28c4cb80fab2379be8a7578a77d665280ee883141a49a
-
Filesize
56KB
MD50b8b17a617b6c205633b1ac80ecc3f5d
SHA12c6edcb78c8487cc46065580a31d3544e54328a7
SHA256abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f
SHA5123c081b8e01c1d0aba1ed679dbf4ca086facfdf4edaac51c90b24a43fea4f17ff5c43367bb4a95f01c5a28c4cb80fab2379be8a7578a77d665280ee883141a49a
-
Filesize
56KB
MD50b8b17a617b6c205633b1ac80ecc3f5d
SHA12c6edcb78c8487cc46065580a31d3544e54328a7
SHA256abe8f7de9741c4a156f560fb0dc11ecbac07919c27a4abf88c2525e1d314517f
SHA5123c081b8e01c1d0aba1ed679dbf4ca086facfdf4edaac51c90b24a43fea4f17ff5c43367bb4a95f01c5a28c4cb80fab2379be8a7578a77d665280ee883141a49a