Analysis
-
max time kernel
174s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 11:31
Static task
static1
Behavioral task
behavioral1
Sample
99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe
Resource
win10v2004-20220812-en
General
-
Target
99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe
-
Size
253KB
-
MD5
7eb77d2ef32d7e5bb52882931a7fe460
-
SHA1
334a7620bebbf7d7b9f7febb1077ff26b9c33783
-
SHA256
99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07
-
SHA512
75b577d8e9a88303c614208727da548acef10c3a02e1693f388321eca335276a4f383e60f718d243e2cdbc4652d499559f27b6b7b540392007706f5656a4aef1
-
SSDEEP
3072:AW7RbmjSAr0JAK7W+6mbEQSQ9j0qOqnSXQd+QcWUNoZ75RWetn:Aga+Ar0J3RSQ9j0OnSXQd+tWUNi9Rt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5088 Ffucaa.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe File created C:\Windows\Ffucaa.exe 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe File opened for modification C:\Windows\Ffucaa.exe 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Ffucaa.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Ffucaa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\International Ffucaa.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main Ffucaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe 5088 Ffucaa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3316 wrote to memory of 5088 3316 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe 80 PID 3316 wrote to memory of 5088 3316 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe 80 PID 3316 wrote to memory of 5088 3316 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe"C:\Users\Admin\AppData\Local\Temp\99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\Ffucaa.exeC:\Windows\Ffucaa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD57eb77d2ef32d7e5bb52882931a7fe460
SHA1334a7620bebbf7d7b9f7febb1077ff26b9c33783
SHA25699a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07
SHA51275b577d8e9a88303c614208727da548acef10c3a02e1693f388321eca335276a4f383e60f718d243e2cdbc4652d499559f27b6b7b540392007706f5656a4aef1
-
Filesize
253KB
MD57eb77d2ef32d7e5bb52882931a7fe460
SHA1334a7620bebbf7d7b9f7febb1077ff26b9c33783
SHA25699a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07
SHA51275b577d8e9a88303c614208727da548acef10c3a02e1693f388321eca335276a4f383e60f718d243e2cdbc4652d499559f27b6b7b540392007706f5656a4aef1
-
Filesize
426B
MD5abd6c9d660a16a7f881642edd4f4f071
SHA1b87b41d3854ad303ca967781e303f91ab0742549
SHA2569d2dec690752ee4f57a4cd907b7500ee8f1be0a762a7e2459f5573f66c7bce93
SHA512931450426a2699b75c15bf9f8ca4a1c4fc422c48a4c115e09feaf5b249c528727981a9109921d96cb5f029bdbecc6091c656e77856160a226a9ac800f2ec5652