Analysis
-
max time kernel
298s -
max time network
272s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
06/12/2022, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
c870025f693df5311e58f7213b426f7ec204e21255a4737723bf5efe24ff72de.exe
Resource
win7-20221111-en
General
-
Target
c870025f693df5311e58f7213b426f7ec204e21255a4737723bf5efe24ff72de.exe
-
Size
1.6MB
-
MD5
61494a835ce331d776c27fc6584930c7
-
SHA1
b8c85f0cfb217441608e7019f193579e03047082
-
SHA256
c870025f693df5311e58f7213b426f7ec204e21255a4737723bf5efe24ff72de
-
SHA512
c605862f9b9264d7333b75091f1f7495459680139f0e44a6db3826ac51091cea83f5a051513c979219029ae694cab073231fea4d3adfed31000dbb7e6a3cd902
-
SSDEEP
49152:O2Jd3BBHWSCVaUMmKaEahivTVLW2Rx0fC+jeE6N:O2j3BzCVVFKa+7I5fC+S7N
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3392 created 3052 3392 Maui.exe.pif 35 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" jsc.exe -
Executes dropped EXE 3 IoCs
pid Process 4256 Engine.exe 3392 Maui.exe.pif 2164 owokVWCwmi.exe.com -
resource yara_rule behavioral2/files/0x000d00000001abff-157.dat upx behavioral2/memory/4256-167-0x0000000000400000-0x0000000000558000-memory.dmp upx behavioral2/files/0x000d00000001abff-165.dat upx behavioral2/memory/4256-323-0x0000000000400000-0x0000000000558000-memory.dmp upx behavioral2/memory/4256-551-0x0000000000400000-0x0000000000558000-memory.dmp upx -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\owokVWCwmi.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\owokVWCwmi.url cmd.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini bcastdvr.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 eth0.me -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3392 set thread context of 4988 3392 Maui.exe.pif 84 -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags GamePanel.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3428 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2676 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4676 powershell.exe 4676 powershell.exe 4676 powershell.exe 4676 powershell.exe 876 powershell.exe 876 powershell.exe 876 powershell.exe 876 powershell.exe 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 4988 jsc.exe 4988 jsc.exe 4988 jsc.exe 4988 jsc.exe 3392 Maui.exe.pif 3392 Maui.exe.pif 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 3392 Maui.exe.pif 3392 Maui.exe.pif -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4676 powershell.exe Token: SeDebugPrivilege 876 powershell.exe Token: SeDebugPrivilege 4988 jsc.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3392 Maui.exe.pif 3392 Maui.exe.pif 3392 Maui.exe.pif 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com 2164 owokVWCwmi.exe.com -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 4544 wrote to memory of 4256 4544 c870025f693df5311e58f7213b426f7ec204e21255a4737723bf5efe24ff72de.exe 66 PID 4544 wrote to memory of 4256 4544 c870025f693df5311e58f7213b426f7ec204e21255a4737723bf5efe24ff72de.exe 66 PID 4544 wrote to memory of 4256 4544 c870025f693df5311e58f7213b426f7ec204e21255a4737723bf5efe24ff72de.exe 66 PID 4256 wrote to memory of 3044 4256 Engine.exe 67 PID 4256 wrote to memory of 3044 4256 Engine.exe 67 PID 4256 wrote to memory of 3044 4256 Engine.exe 67 PID 3044 wrote to memory of 4156 3044 cmd.exe 71 PID 3044 wrote to memory of 4156 3044 cmd.exe 71 PID 3044 wrote to memory of 4156 3044 cmd.exe 71 PID 4156 wrote to memory of 4676 4156 cmd.exe 74 PID 4156 wrote to memory of 4676 4156 cmd.exe 74 PID 4156 wrote to memory of 4676 4156 cmd.exe 74 PID 4156 wrote to memory of 876 4156 cmd.exe 75 PID 4156 wrote to memory of 876 4156 cmd.exe 75 PID 4156 wrote to memory of 876 4156 cmd.exe 75 PID 4156 wrote to memory of 2396 4156 cmd.exe 76 PID 4156 wrote to memory of 2396 4156 cmd.exe 76 PID 4156 wrote to memory of 2396 4156 cmd.exe 76 PID 4156 wrote to memory of 3392 4156 cmd.exe 77 PID 4156 wrote to memory of 3392 4156 cmd.exe 77 PID 4156 wrote to memory of 3392 4156 cmd.exe 77 PID 4156 wrote to memory of 2676 4156 cmd.exe 78 PID 4156 wrote to memory of 2676 4156 cmd.exe 78 PID 4156 wrote to memory of 2676 4156 cmd.exe 78 PID 3392 wrote to memory of 4324 3392 Maui.exe.pif 79 PID 3392 wrote to memory of 4324 3392 Maui.exe.pif 79 PID 3392 wrote to memory of 4324 3392 Maui.exe.pif 79 PID 3392 wrote to memory of 3428 3392 Maui.exe.pif 81 PID 3392 wrote to memory of 3428 3392 Maui.exe.pif 81 PID 3392 wrote to memory of 3428 3392 Maui.exe.pif 81 PID 3392 wrote to memory of 4988 3392 Maui.exe.pif 84 PID 3392 wrote to memory of 4988 3392 Maui.exe.pif 84 PID 3392 wrote to memory of 4988 3392 Maui.exe.pif 84 PID 3392 wrote to memory of 4988 3392 Maui.exe.pif 84 PID 3392 wrote to memory of 4988 3392 Maui.exe.pif 84
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\c870025f693df5311e58f7213b426f7ec204e21255a4737723bf5efe24ff72de.exe"C:\Users\Admin\AppData\Local\Temp\c870025f693df5311e58f7213b426f7ec204e21255a4737723bf5efe24ff72de.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\SETUP_36460\Engine.exeC:\Users\Admin\AppData\Local\Temp\SETUP_36460\Engine.exe /TH_ID=_4548 /OriginExe="C:\Users\Admin\AppData\Local\Temp\c870025f693df5311e58f7213b426f7ec204e21255a4737723bf5efe24ff72de.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd < Translated.cda4⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\cmd.execmd5⤵
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell get-process avastui6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell get-process avgui6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^dMaM$" Thousands.cda6⤵PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\npgtkcrh.jvv\Maui.exe.pifMaui.exe.pif c6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Similar" /tr "C:\Users\Admin\AppData\Local\jucxIOkyRf\owokVWCwmi.exe.com C:\Users\Admin\AppData\Local\jucxIOkyRf\T" /sc minute /mo 3 /F7⤵
- Creates scheduled task(s)
PID:3428
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe7⤵
- UAC bypass
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 86⤵
- Runs ping.exe
PID:2676
-
-
-
-
-
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 00000000000701C6 /startuptips2⤵
- Checks SCSI registry key(s)
PID:4216
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\owokVWCwmi.url" & echo URL="C:\Users\Admin\AppData\Local\jucxIOkyRf\TXLYzJN.vbs" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\owokVWCwmi.url"2⤵
- Drops startup file
PID:4324
-
-
C:\Windows\System32\bcastdvr.exe"C:\Windows\System32\bcastdvr.exe" -ServerName:Windows.Media.Capture.Internal.BroadcastDVRServer1⤵
- Drops desktop.ini file(s)
PID:4208
-
C:\Users\Admin\AppData\Local\jucxIOkyRf\owokVWCwmi.exe.comC:\Users\Admin\AppData\Local\jucxIOkyRf\owokVWCwmi.exe.com C:\Users\Admin\AppData\Local\jucxIOkyRf\T1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56bf0e5945fb9da68e1b03bdaed5f6f8d
SHA1eed3802c8e4abe3b327c100c99c53d3bbcf8a33d
SHA256dda58fd16fee83a65c05936b1a070187f2c360024650ecaf857c5e060a6a55f1
SHA512977a393fdad2b162aa42194ddad6ec8bcab24f81980ff01b1c22c4d59ac268bb5ce947105c968de1a8a66b35023280a1e7709dfea5053385f87141389ebecb25
-
Filesize
18KB
MD59b07c6ce605ad56261a603b52d5f2a21
SHA15139e8c20ecf79ea171ae847d77c6348efcb11ab
SHA25659bd1c4d8c124179c203e61898a30ccc45226a0a7384e604feab1a8f5f670024
SHA5120e24753dc8e8d1be24cc77a588390fe791b0585d6eb205f9c4238de527f8bf2836f19095c4ccc17f8d3b1b4e66d45008e201d99a7af0b37f8826a92f8417c914
-
Filesize
1.5MB
MD55dd1213377ce2f40b914c5ea22166b55
SHA1988e9e72aeecf060b3ed72f61763bd130784bca9
SHA256d7909fd46fabe766cb531a7cb0e23243c40c8f60918c7dd68612734606ce5ec7
SHA51235735187cfe55f73920ea62cebdb39fdb0f492b6290cd46cfb236199d7853d64fbc2af0cc263b2fdd8e92e5b55cac60cc3f9a3634ead024b50491fa29f77fca8
-
Filesize
872KB
MD536f5c4696f54a98e1bf256df033e34cf
SHA152bc9d595effbf4e4b10b3381f44e0306a42d0f4
SHA256656af4bee6b89094a6828394bf7ea26058abf5186ab606b15440ac1b33fdadcd
SHA5127763dfba62149936fa494e7d95117e7ae1ff6010dfe5ff999baddc090f3c5f731043513bcd1d0529f4d8daaa6d29dfd9c5bbd268ca6736ca146df68ad8321a85
-
Filesize
11KB
MD5fadbcd2fb4be032ff6145b94eeed068e
SHA15cec98c304099488f9f31f61856700a0b8733a34
SHA256c288b141d2988401ef472325b601d4ee2b4a16b71e6637a7f252556fabe59412
SHA5124e14c3f89bcb0efab9ef26defdca7ce3d47c9a608b854cc23d47fb600def1e1e859f155203a4ccd3fb691f821d675c89cc003bca665c93c628c2e6010b500a2e
-
Filesize
392KB
MD5e57156daad46c61a0395df1fdbadc766
SHA111c4359be8649ed873fa1904c89b51ef6a631081
SHA256dca85f4607b1535bd9daad75f57646b53d2b7e2a381a2306ab62cce0e61b1a35
SHA51294e5cd2233733f5ecd08fec3cfa82ccd71302697f8c37f8fb04d8dabf75cd2d7a58ce24080b1464a73e0d587a3d611056464ff54ff0bc9cc3d190156cbd8ecf2
-
Filesize
392KB
MD5e57156daad46c61a0395df1fdbadc766
SHA111c4359be8649ed873fa1904c89b51ef6a631081
SHA256dca85f4607b1535bd9daad75f57646b53d2b7e2a381a2306ab62cce0e61b1a35
SHA51294e5cd2233733f5ecd08fec3cfa82ccd71302697f8c37f8fb04d8dabf75cd2d7a58ce24080b1464a73e0d587a3d611056464ff54ff0bc9cc3d190156cbd8ecf2
-
Filesize
7KB
MD51dd88f67f029710d5c5858a6293a93f1
SHA13e5ef66613415fe9467b2a24ccc27d8f997e7df6
SHA256b5dad33ceb6eb1ac2a05fbda76e29a73038403939218a88367925c3a20c05532
SHA5127071fd64038e0058c8c586c63c62677c0ca403768100f90323cf9c0bc7b7fcb538391e6f3606bd7970b8769445606ada47adcdcfc1e991e25caf272a13e10c94
-
Filesize
2KB
MD5e143502369ba42ea20e32419536742aa
SHA1934b2801180d21671ea388d6c608d694617f3f6b
SHA256b242bd6554cf480c29129c89b693a49cd37452a796211e8a6b747423c93bce8f
SHA512407eb2cca10016cc15b6f8e37e2ce60aa34b3c314cf84c2389311c39a0c766571db3182e28efc71eb82d168b074072aa9d35bdba9dfea40a5ef3abf7d7838b0e
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
1.5MB
MD55dd1213377ce2f40b914c5ea22166b55
SHA1988e9e72aeecf060b3ed72f61763bd130784bca9
SHA256d7909fd46fabe766cb531a7cb0e23243c40c8f60918c7dd68612734606ce5ec7
SHA51235735187cfe55f73920ea62cebdb39fdb0f492b6290cd46cfb236199d7853d64fbc2af0cc263b2fdd8e92e5b55cac60cc3f9a3634ead024b50491fa29f77fca8
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c