Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
720736e1ef8f083f0cd38b87331a42bee66aeff66aaefadf60d1575e6edb975b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
720736e1ef8f083f0cd38b87331a42bee66aeff66aaefadf60d1575e6edb975b.exe
Resource
win10v2004-20220812-en
General
-
Target
720736e1ef8f083f0cd38b87331a42bee66aeff66aaefadf60d1575e6edb975b.exe
-
Size
558KB
-
MD5
3078d175d9290669cc91110fb6b181e0
-
SHA1
f5c98b1720fbb04f2e7a9903a70d3006a77ee249
-
SHA256
720736e1ef8f083f0cd38b87331a42bee66aeff66aaefadf60d1575e6edb975b
-
SHA512
7c3838c9e1ef648dbf4c799b786b504819c12978ffe1a7aef1c976b7a5f04b76df598412b4a69548cb57924331e28046ca9bf5b03cfe0a67ee1918f2dedb0bb6
-
SSDEEP
12288:4i/7dcicGyyWLSykm4ygZeF7o8KqTNKYQR82Afk:r5/yyWLym4VQo8KUpX6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 448 uyq.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\B48B4A40 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uyq.exe" 720736e1ef8f083f0cd38b87331a42bee66aeff66aaefadf60d1575e6edb975b.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: uyq.exe File opened (read-only) \??\T: uyq.exe File opened (read-only) \??\V: uyq.exe File opened (read-only) \??\M: uyq.exe File opened (read-only) \??\N: uyq.exe File opened (read-only) \??\H: uyq.exe File opened (read-only) \??\L: uyq.exe File opened (read-only) \??\S: uyq.exe File opened (read-only) \??\W: uyq.exe File opened (read-only) \??\E: uyq.exe File opened (read-only) \??\F: uyq.exe File opened (read-only) \??\P: uyq.exe File opened (read-only) \??\U: uyq.exe File opened (read-only) \??\Y: uyq.exe File opened (read-only) \??\Z: uyq.exe File opened (read-only) \??\G: uyq.exe File opened (read-only) \??\J: uyq.exe File opened (read-only) \??\I: uyq.exe File opened (read-only) \??\K: uyq.exe File opened (read-only) \??\Q: uyq.exe File opened (read-only) \??\R: uyq.exe File opened (read-only) \??\X: uyq.exe File opened (read-only) \??\A: uyq.exe File opened (read-only) \??\B: uyq.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\FC5555F5 = "3880213916" uyq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\720736e1ef8f083f0cd38b87331a42bee66aeff66aaefadf60d1575e6edb975b.exe"C:\Users\Admin\AppData\Local\Temp\720736e1ef8f083f0cd38b87331a42bee66aeff66aaefadf60d1575e6edb975b.exe"1⤵
- Adds Run key to start application
PID:4828
-
C:\Users\Admin\AppData\Local\Temp\uyq.exeC:\Users\Admin\AppData\Local\Temp\uyq.exe -svc1⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies Internet Explorer settings
PID:448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD53078d175d9290669cc91110fb6b181e0
SHA1f5c98b1720fbb04f2e7a9903a70d3006a77ee249
SHA256720736e1ef8f083f0cd38b87331a42bee66aeff66aaefadf60d1575e6edb975b
SHA5127c3838c9e1ef648dbf4c799b786b504819c12978ffe1a7aef1c976b7a5f04b76df598412b4a69548cb57924331e28046ca9bf5b03cfe0a67ee1918f2dedb0bb6
-
Filesize
558KB
MD53078d175d9290669cc91110fb6b181e0
SHA1f5c98b1720fbb04f2e7a9903a70d3006a77ee249
SHA256720736e1ef8f083f0cd38b87331a42bee66aeff66aaefadf60d1575e6edb975b
SHA5127c3838c9e1ef648dbf4c799b786b504819c12978ffe1a7aef1c976b7a5f04b76df598412b4a69548cb57924331e28046ca9bf5b03cfe0a67ee1918f2dedb0bb6