Analysis
-
max time kernel
142s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 13:29
Static task
static1
Behavioral task
behavioral1
Sample
f1b3e499d6e83d1d2038eb835205e2fd2bc79b1a4b5dd8823c88ec9356a95aa4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f1b3e499d6e83d1d2038eb835205e2fd2bc79b1a4b5dd8823c88ec9356a95aa4.exe
Resource
win10v2004-20220812-en
General
-
Target
f1b3e499d6e83d1d2038eb835205e2fd2bc79b1a4b5dd8823c88ec9356a95aa4.exe
-
Size
38.1MB
-
MD5
d94d71e62542ed54a477eb1bb39ead06
-
SHA1
ae2c54dfee8a433f239f9dfcd84e3cd9290edfc4
-
SHA256
f1b3e499d6e83d1d2038eb835205e2fd2bc79b1a4b5dd8823c88ec9356a95aa4
-
SHA512
3a9ef6d9933ea8c17b83edfa82c5f9858d7ceed34681bd8f587b8ed3396b9c4f3370d5ce53b66e36e029b567857210fdde346a6ddc055cca7ee684f9763da1ce
-
SSDEEP
786432:byV4FVHIo9fiTpQTmMxY23oHzOkSBf3OY:WV4wo9fMQfxCikW/OY
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3864 pfactory_batch_setup_m32.exe 1252 GLBF184.tmp -
Loads dropped DLL 3 IoCs
pid Process 1252 GLBF184.tmp 1252 GLBF184.tmp 1252 GLBF184.tmp -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\f1b3e499d6e83d1d2038eb835205e2fd2bc79b1a4b5dd8823c88ec9356a95aa4 = "C:\\Users\\Public\\Dcuov\\Yerg.exe /f1b3e499d6e83d1d2038eb835205e2fd2bc79b1a4b5dd8823c88ec9356a95aa4" f1b3e499d6e83d1d2038eb835205e2fd2bc79b1a4b5dd8823c88ec9356a95aa4.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run f1b3e499d6e83d1d2038eb835205e2fd2bc79b1a4b5dd8823c88ec9356a95aa4.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\GLBSINST.%$D GLBF184.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2348 wrote to memory of 3864 2348 f1b3e499d6e83d1d2038eb835205e2fd2bc79b1a4b5dd8823c88ec9356a95aa4.exe 78 PID 2348 wrote to memory of 3864 2348 f1b3e499d6e83d1d2038eb835205e2fd2bc79b1a4b5dd8823c88ec9356a95aa4.exe 78 PID 2348 wrote to memory of 3864 2348 f1b3e499d6e83d1d2038eb835205e2fd2bc79b1a4b5dd8823c88ec9356a95aa4.exe 78 PID 3864 wrote to memory of 1252 3864 pfactory_batch_setup_m32.exe 79 PID 3864 wrote to memory of 1252 3864 pfactory_batch_setup_m32.exe 79 PID 3864 wrote to memory of 1252 3864 pfactory_batch_setup_m32.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1b3e499d6e83d1d2038eb835205e2fd2bc79b1a4b5dd8823c88ec9356a95aa4.exe"C:\Users\Admin\AppData\Local\Temp\f1b3e499d6e83d1d2038eb835205e2fd2bc79b1a4b5dd8823c88ec9356a95aa4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Epmk529\pfactory_batch_setup_m32.exeC:\Users\Admin\AppData\Local\Temp\Epmk529\pfactory_batch_setup_m32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\GLBF184.tmpC:\Users\Admin\AppData\Local\Temp\GLBF184.tmp 4736 C:\Users\Admin\AppData\Local\Temp\Epmk529\PFACTO~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1252
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.5MB
MD5a5902492f410231a04bfddf2c6e1c2dd
SHA15107f93ca0fa52f746a8b7c10a6de588964d6682
SHA25640c4f4a8fbc1df19abfd17e805ce5c8aeecd6ea9d66dd284df7f1080fc3074a8
SHA512cfa8e348fc17c8d495950ee28a9a7681914ff78402aad9b41823610d7d48e779a739ae87ac9cc356f17cba0e1529e9f8ad0253d2bdfdfbb2dffba56aca11e2c6
-
Filesize
9.5MB
MD5a5902492f410231a04bfddf2c6e1c2dd
SHA15107f93ca0fa52f746a8b7c10a6de588964d6682
SHA25640c4f4a8fbc1df19abfd17e805ce5c8aeecd6ea9d66dd284df7f1080fc3074a8
SHA512cfa8e348fc17c8d495950ee28a9a7681914ff78402aad9b41823610d7d48e779a739ae87ac9cc356f17cba0e1529e9f8ad0253d2bdfdfbb2dffba56aca11e2c6
-
Filesize
70KB
MD5620a234d003cb61511c134cfadfdfad1
SHA19de80f0485635c081f86d660cc83c4871061b349
SHA256b24283da3bb7d662ae6ce3dc87b99b3edef0e8c0fe1e195ceb7a112aff89bc73
SHA512d51ed48a009cb6efffa363ffabc7b9cd363534a5b4c9ef2360240ec08a65fed0faa70ddc152ec57430fc95e9ee505e7e8417cca604226a93e36d6d8c5c66ee7e
-
Filesize
70KB
MD5620a234d003cb61511c134cfadfdfad1
SHA19de80f0485635c081f86d660cc83c4871061b349
SHA256b24283da3bb7d662ae6ce3dc87b99b3edef0e8c0fe1e195ceb7a112aff89bc73
SHA512d51ed48a009cb6efffa363ffabc7b9cd363534a5b4c9ef2360240ec08a65fed0faa70ddc152ec57430fc95e9ee505e7e8417cca604226a93e36d6d8c5c66ee7e
-
Filesize
161KB
MD58c97d8bb1470c6498e47b12c5a03ce39
SHA115d233b22f1c3d756dca29bcc0021e6fb0b8cdf7
SHA256a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a
SHA5127ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f
-
Filesize
33KB
MD5517419cae37f6c78c80f9b7d0fbb8661
SHA1a9e419f3d9ef589522556e0920c84fe37a548873
SHA256bfe7e013cfb85e78b994d3ad34eca08286494a835cb85f1d7bced3df6fe93a11
SHA5125046565443cf463b6fa4d2d5868879efc6a9db969bf05e3c80725b99bd091ce062cfe66c5551eb1cc5f00a38f2cfcda1f36fb4d60d9ff816c4ec3107b5a0df40
-
Filesize
33KB
MD5517419cae37f6c78c80f9b7d0fbb8661
SHA1a9e419f3d9ef589522556e0920c84fe37a548873
SHA256bfe7e013cfb85e78b994d3ad34eca08286494a835cb85f1d7bced3df6fe93a11
SHA5125046565443cf463b6fa4d2d5868879efc6a9db969bf05e3c80725b99bd091ce062cfe66c5551eb1cc5f00a38f2cfcda1f36fb4d60d9ff816c4ec3107b5a0df40