Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 21:14
Static task
static1
Behavioral task
behavioral1
Sample
7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe
Resource
win10v2004-20221111-en
General
-
Target
7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe
-
Size
460KB
-
MD5
a2546e26c5bf4dc5c5f3f3e173412618
-
SHA1
bbe054795a329a9e7bb874cd3714360d75ba7dfe
-
SHA256
7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7
-
SHA512
95bf0a97ddf141642d46a64ce79a5f599de0147fd8b9a0fc90acdf00dbf983608cd762055a425e85750f061235f6f0919393a05d90e107fe380fbc1fa3640fb0
-
SSDEEP
12288:gggZ8iH5Pbd3bik6cT0MPJdpY6qVD6G8Jsyq0Sy22qw4Ea3Ygsfn7nRa:++4tbipCFS6qVD6GEsyqJ14a3+n9a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1928 ukne.exe -
Deletes itself 1 IoCs
pid Process 1812 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2036 7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run ukne.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ukne = "C:\\Users\\Admin\\AppData\\Roaming\\Idju\\ukne.exe" ukne.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2036 set thread context of 1812 2036 7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe 29 -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe 1928 ukne.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1928 2036 7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe 28 PID 2036 wrote to memory of 1928 2036 7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe 28 PID 2036 wrote to memory of 1928 2036 7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe 28 PID 2036 wrote to memory of 1928 2036 7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe 28 PID 1928 wrote to memory of 1120 1928 ukne.exe 12 PID 1928 wrote to memory of 1120 1928 ukne.exe 12 PID 1928 wrote to memory of 1120 1928 ukne.exe 12 PID 1928 wrote to memory of 1120 1928 ukne.exe 12 PID 1928 wrote to memory of 1120 1928 ukne.exe 12 PID 1928 wrote to memory of 1176 1928 ukne.exe 13 PID 1928 wrote to memory of 1176 1928 ukne.exe 13 PID 1928 wrote to memory of 1176 1928 ukne.exe 13 PID 1928 wrote to memory of 1176 1928 ukne.exe 13 PID 1928 wrote to memory of 1176 1928 ukne.exe 13 PID 1928 wrote to memory of 1212 1928 ukne.exe 14 PID 1928 wrote to memory of 1212 1928 ukne.exe 14 PID 1928 wrote to memory of 1212 1928 ukne.exe 14 PID 1928 wrote to memory of 1212 1928 ukne.exe 14 PID 1928 wrote to memory of 1212 1928 ukne.exe 14 PID 1928 wrote to memory of 2036 1928 ukne.exe 27 PID 1928 wrote to memory of 2036 1928 ukne.exe 27 PID 1928 wrote to memory of 2036 1928 ukne.exe 27 PID 1928 wrote to memory of 2036 1928 ukne.exe 27 PID 1928 wrote to memory of 2036 1928 ukne.exe 27 PID 2036 wrote to memory of 1812 2036 7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe 29 PID 2036 wrote to memory of 1812 2036 7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe 29 PID 2036 wrote to memory of 1812 2036 7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe 29 PID 2036 wrote to memory of 1812 2036 7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe 29 PID 2036 wrote to memory of 1812 2036 7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe 29 PID 2036 wrote to memory of 1812 2036 7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe 29 PID 2036 wrote to memory of 1812 2036 7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe 29 PID 2036 wrote to memory of 1812 2036 7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe 29 PID 2036 wrote to memory of 1812 2036 7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe 29 PID 1928 wrote to memory of 636 1928 ukne.exe 30 PID 1928 wrote to memory of 636 1928 ukne.exe 30 PID 1928 wrote to memory of 636 1928 ukne.exe 30 PID 1928 wrote to memory of 636 1928 ukne.exe 30 PID 1928 wrote to memory of 636 1928 ukne.exe 30
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe"C:\Users\Admin\AppData\Local\Temp\7d90e1de880e7a2bec1f793cf1deca14533d0babecd085bdfa4db49bb5e50cb7.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Roaming\Idju\ukne.exe"C:\Users\Admin\AppData\Roaming\Idju\ukne.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1928
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\NTVC99.bat"3⤵
- Deletes itself
PID:1812
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "20860140562077549294-12936833091875970605-6862444671886358810-707350413-1550065785"1⤵PID:636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD54e64f3be3972c2629c82e6910db8186b
SHA1aa048c4c71221841f65155cdeab5e34c00574084
SHA256890b715b1bb029c10e80d8d289410ac9c884a0487f7c771678ca9e4756f51ff3
SHA5127841fc1f0ae8e6a996a0b45c70f1b5a235548321268437960502ae168683df7c3be8cc73f326675ee1cb85a24d5d618cdbda9011a65b31d19d0998478e5d8a2e
-
Filesize
460KB
MD56940051ef0e5ed26c78995742b3eb455
SHA137d695ae450720b1c72226b7d848690740999091
SHA2560e1e92d8650eec531a2138481f314a195a77742d3ea51f46647d0e322952313a
SHA512ea6b47ba740df090cd7f382d0d909183dd32a102846382d942aaa756295bc7d4bc5ed09beadbc590919c4dcf488f9ff74727c8c15d19b67a5f9ab01ced7544a5
-
Filesize
460KB
MD56940051ef0e5ed26c78995742b3eb455
SHA137d695ae450720b1c72226b7d848690740999091
SHA2560e1e92d8650eec531a2138481f314a195a77742d3ea51f46647d0e322952313a
SHA512ea6b47ba740df090cd7f382d0d909183dd32a102846382d942aaa756295bc7d4bc5ed09beadbc590919c4dcf488f9ff74727c8c15d19b67a5f9ab01ced7544a5
-
Filesize
460KB
MD56940051ef0e5ed26c78995742b3eb455
SHA137d695ae450720b1c72226b7d848690740999091
SHA2560e1e92d8650eec531a2138481f314a195a77742d3ea51f46647d0e322952313a
SHA512ea6b47ba740df090cd7f382d0d909183dd32a102846382d942aaa756295bc7d4bc5ed09beadbc590919c4dcf488f9ff74727c8c15d19b67a5f9ab01ced7544a5