Analysis
-
max time kernel
188s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe
Resource
win10v2004-20221111-en
General
-
Target
2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe
-
Size
189KB
-
MD5
15789a72aa5c8fde6bcb5ea188f07bd1
-
SHA1
7ff5f833f0b08fd7a2435d61cf8caf04e513ef1e
-
SHA256
2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2
-
SHA512
1175e736f0da94fba7a63db8ad6d3a65a340c87a60870dc921d686c42c97ac19d4e040ec71de5baef124028df05c70e185b136933e71f2b67dfba2f833a7a75d
-
SSDEEP
3072:hwSnerLrQIyzZrJnAsW113pBHyakipJI0Y7gvbWWZmw1FC/OBsYP6dwyz:h/nOfzyt9nRyBSakipJINwbVz2OBZPqz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1240 agdi.exe -
Deletes itself 1 IoCs
pid Process 1052 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run agdi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{934D6CB5-5AC2-7D89-5B36-DE2878EC8E4A} = "C:\\Users\\Admin\\AppData\\Roaming\\Uvnyif\\agdi.exe" agdi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 604 set thread context of 1052 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 29 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 1240 agdi.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 1240 agdi.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 1240 agdi.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 1240 agdi.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 1240 agdi.exe 1240 agdi.exe 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 1240 agdi.exe 1240 agdi.exe 1052 cmd.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe 1240 agdi.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 604 wrote to memory of 1240 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 28 PID 604 wrote to memory of 1240 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 28 PID 604 wrote to memory of 1240 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 28 PID 604 wrote to memory of 1240 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 28 PID 1240 wrote to memory of 1112 1240 agdi.exe 13 PID 1240 wrote to memory of 1112 1240 agdi.exe 13 PID 1240 wrote to memory of 1112 1240 agdi.exe 13 PID 1240 wrote to memory of 1112 1240 agdi.exe 13 PID 1240 wrote to memory of 1112 1240 agdi.exe 13 PID 1240 wrote to memory of 1200 1240 agdi.exe 11 PID 1240 wrote to memory of 1200 1240 agdi.exe 11 PID 1240 wrote to memory of 1200 1240 agdi.exe 11 PID 1240 wrote to memory of 1200 1240 agdi.exe 11 PID 1240 wrote to memory of 1200 1240 agdi.exe 11 PID 1240 wrote to memory of 1248 1240 agdi.exe 10 PID 1240 wrote to memory of 1248 1240 agdi.exe 10 PID 1240 wrote to memory of 1248 1240 agdi.exe 10 PID 1240 wrote to memory of 1248 1240 agdi.exe 10 PID 1240 wrote to memory of 1248 1240 agdi.exe 10 PID 1240 wrote to memory of 604 1240 agdi.exe 12 PID 1240 wrote to memory of 604 1240 agdi.exe 12 PID 1240 wrote to memory of 604 1240 agdi.exe 12 PID 1240 wrote to memory of 604 1240 agdi.exe 12 PID 1240 wrote to memory of 604 1240 agdi.exe 12 PID 604 wrote to memory of 1052 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 29 PID 604 wrote to memory of 1052 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 29 PID 604 wrote to memory of 1052 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 29 PID 604 wrote to memory of 1052 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 29 PID 604 wrote to memory of 1052 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 29 PID 604 wrote to memory of 1052 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 29 PID 604 wrote to memory of 1052 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 29 PID 604 wrote to memory of 1052 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 29 PID 604 wrote to memory of 1052 604 2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe 29 PID 1240 wrote to memory of 1020 1240 agdi.exe 30 PID 1240 wrote to memory of 1020 1240 agdi.exe 30 PID 1240 wrote to memory of 1020 1240 agdi.exe 30 PID 1240 wrote to memory of 1020 1240 agdi.exe 30 PID 1240 wrote to memory of 1020 1240 agdi.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe"C:\Users\Admin\AppData\Local\Temp\2e2add6d5902cdb228862d7cb4920610ff0a43ef97161feb5afb3f1cb46108b2.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Roaming\Uvnyif\agdi.exe"C:\Users\Admin\AppData\Roaming\Uvnyif\agdi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1240
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpe7a5d836.bat"3⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
PID:1052
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1200
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "13595284241969626036-1893277575-1527694620-400980217190463065-1989963510561579453"1⤵PID:1020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5359ae6711a2d383477babe3983ed11e3
SHA1fb90523bc93b55f2079b786df7fb1c431d4c0c6f
SHA256e5d8bf53db824082559bd96058b03fb4548bb66d0f54d1f4d1df1c58a0631119
SHA5122fc8d2f4107d3e329232564284233236cd07a77edb620a63fa45694583132d5675352dd03491c63202a26a3364692155db5bcfbe46c153ba37376b40a8109e52
-
Filesize
189KB
MD5ca6e68682259d8c4a48f135b04a328a6
SHA18c8aa9a58f7fbf83888fe847e7b74a03e5d22983
SHA2566d311253c901a2ae8a75316b9450a4652f7ef83fdea93e55f9df6f4182d6ff09
SHA512071fcf5fc7e0669e9ad650e00cfa7f011fd918a14d5c06352e6b9e15651fcf5945b60c1d72c48ceff866fa976a0fcc0a973d0184361e52d6abf2d1a51ec8b10d
-
Filesize
189KB
MD5ca6e68682259d8c4a48f135b04a328a6
SHA18c8aa9a58f7fbf83888fe847e7b74a03e5d22983
SHA2566d311253c901a2ae8a75316b9450a4652f7ef83fdea93e55f9df6f4182d6ff09
SHA512071fcf5fc7e0669e9ad650e00cfa7f011fd918a14d5c06352e6b9e15651fcf5945b60c1d72c48ceff866fa976a0fcc0a973d0184361e52d6abf2d1a51ec8b10d
-
Filesize
189KB
MD5ca6e68682259d8c4a48f135b04a328a6
SHA18c8aa9a58f7fbf83888fe847e7b74a03e5d22983
SHA2566d311253c901a2ae8a75316b9450a4652f7ef83fdea93e55f9df6f4182d6ff09
SHA512071fcf5fc7e0669e9ad650e00cfa7f011fd918a14d5c06352e6b9e15651fcf5945b60c1d72c48ceff866fa976a0fcc0a973d0184361e52d6abf2d1a51ec8b10d
-
Filesize
189KB
MD5ca6e68682259d8c4a48f135b04a328a6
SHA18c8aa9a58f7fbf83888fe847e7b74a03e5d22983
SHA2566d311253c901a2ae8a75316b9450a4652f7ef83fdea93e55f9df6f4182d6ff09
SHA512071fcf5fc7e0669e9ad650e00cfa7f011fd918a14d5c06352e6b9e15651fcf5945b60c1d72c48ceff866fa976a0fcc0a973d0184361e52d6abf2d1a51ec8b10d