Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe
Resource
win10v2004-20221111-en
General
-
Target
8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe
-
Size
328KB
-
MD5
e447571b6cb8967e5428cbb7e07df9fc
-
SHA1
5ba72d05da0642577404d27d25007eadcedb059d
-
SHA256
8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb
-
SHA512
8d8aaf8521bc2be45012a5137f8f7fbde0b016741ad74f4665fb08a4aa03ba0fc25f858f5f1c240e450cea426fe0a0a3ee973ed71b18be28cba3de7e6338b3ca
-
SSDEEP
6144:iU83W+gY6Qkn2eCtN6mb4hZFlepVRzP/mHvAbR3TDOs5a3j:8mA6v5uQK4fFlepHTOAbtLa3j
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 892 ycweh.exe -
Deletes itself 1 IoCs
pid Process 696 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\{CB118568-7F59-AD4D-CD9C-5E5DE9C17D40} = "C:\\Users\\Admin\\AppData\\Roaming\\Uzzee\\ycweh.exe" ycweh.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run ycweh.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2024 set thread context of 696 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe 892 ycweh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 892 ycweh.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2024 wrote to memory of 892 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 27 PID 2024 wrote to memory of 892 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 27 PID 2024 wrote to memory of 892 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 27 PID 2024 wrote to memory of 892 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 27 PID 892 wrote to memory of 1232 892 ycweh.exe 18 PID 892 wrote to memory of 1232 892 ycweh.exe 18 PID 892 wrote to memory of 1232 892 ycweh.exe 18 PID 892 wrote to memory of 1232 892 ycweh.exe 18 PID 892 wrote to memory of 1232 892 ycweh.exe 18 PID 892 wrote to memory of 1328 892 ycweh.exe 17 PID 892 wrote to memory of 1328 892 ycweh.exe 17 PID 892 wrote to memory of 1328 892 ycweh.exe 17 PID 892 wrote to memory of 1328 892 ycweh.exe 17 PID 892 wrote to memory of 1328 892 ycweh.exe 17 PID 892 wrote to memory of 1368 892 ycweh.exe 16 PID 892 wrote to memory of 1368 892 ycweh.exe 16 PID 892 wrote to memory of 1368 892 ycweh.exe 16 PID 892 wrote to memory of 1368 892 ycweh.exe 16 PID 892 wrote to memory of 1368 892 ycweh.exe 16 PID 892 wrote to memory of 2024 892 ycweh.exe 26 PID 892 wrote to memory of 2024 892 ycweh.exe 26 PID 892 wrote to memory of 2024 892 ycweh.exe 26 PID 892 wrote to memory of 2024 892 ycweh.exe 26 PID 892 wrote to memory of 2024 892 ycweh.exe 26 PID 2024 wrote to memory of 696 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 28 PID 2024 wrote to memory of 696 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 28 PID 2024 wrote to memory of 696 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 28 PID 2024 wrote to memory of 696 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 28 PID 2024 wrote to memory of 696 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 28 PID 2024 wrote to memory of 696 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 28 PID 2024 wrote to memory of 696 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 28 PID 2024 wrote to memory of 696 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 28 PID 2024 wrote to memory of 696 2024 8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe"C:\Users\Admin\AppData\Local\Temp\8675819c3e08fd71af709b5c0f3dd70dccb174bece846919ff5cef100bdf29cb.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\Uzzee\ycweh.exe"C:\Users\Admin\AppData\Roaming\Uzzee\ycweh.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpdab28c08.bat"3⤵
- Deletes itself
PID:696
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1328
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5aeefccb9d3c31e9bd7c505f84fdb43d4
SHA124a623591634aa5b4d7ed4890c2c81e8ffd52d23
SHA256fef869c3d9c442b648b0b3a7f84b3e4176048208058d06ec23a8006f73e2566c
SHA512c13680520fd3fb4414c21692d5b55d0f722a0a48b3f30f0862ee74df2de60fbc39e38d4b2d58be62e385c041f13caf450eeeb97f2409b8bc3e2e3072bf599d37
-
Filesize
328KB
MD52cbe865e5fd1f8eb1db339e10dc16624
SHA1d86f820606a86b4e8c023d388564209a953dc0fe
SHA25622913be58ae8a73c46cc495041e6511b112d0ef239ce489dc9cf1b12f66d2a6f
SHA51271552cfbc91ebf35fbf2893def4eb97fd7849965148bf62986252abdd696c4b669f97b5c403b5df343f106ea01f646db703eaa2ac3344432adec402dc6f6074e
-
Filesize
328KB
MD52cbe865e5fd1f8eb1db339e10dc16624
SHA1d86f820606a86b4e8c023d388564209a953dc0fe
SHA25622913be58ae8a73c46cc495041e6511b112d0ef239ce489dc9cf1b12f66d2a6f
SHA51271552cfbc91ebf35fbf2893def4eb97fd7849965148bf62986252abdd696c4b669f97b5c403b5df343f106ea01f646db703eaa2ac3344432adec402dc6f6074e
-
Filesize
328KB
MD52cbe865e5fd1f8eb1db339e10dc16624
SHA1d86f820606a86b4e8c023d388564209a953dc0fe
SHA25622913be58ae8a73c46cc495041e6511b112d0ef239ce489dc9cf1b12f66d2a6f
SHA51271552cfbc91ebf35fbf2893def4eb97fd7849965148bf62986252abdd696c4b669f97b5c403b5df343f106ea01f646db703eaa2ac3344432adec402dc6f6074e
-
Filesize
328KB
MD52cbe865e5fd1f8eb1db339e10dc16624
SHA1d86f820606a86b4e8c023d388564209a953dc0fe
SHA25622913be58ae8a73c46cc495041e6511b112d0ef239ce489dc9cf1b12f66d2a6f
SHA51271552cfbc91ebf35fbf2893def4eb97fd7849965148bf62986252abdd696c4b669f97b5c403b5df343f106ea01f646db703eaa2ac3344432adec402dc6f6074e