Analysis
-
max time kernel
152s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 01:08
Static task
static1
Behavioral task
behavioral1
Sample
b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a.exe
Resource
win10v2004-20220812-en
General
-
Target
b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a.exe
-
Size
148KB
-
MD5
7b70334ddda675512efc3eff1bb9fc6e
-
SHA1
ba1a09b14bb6599821e453be97f326d03a153ee2
-
SHA256
b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a
-
SHA512
275ad9c7e5de0383a61f0eaf114e5aee523672a635bbe26ece18fab9e439087e5aa422fc9c0e97c3f5bae8b1f0df5582040d9b6694dc8e8e7923ed7d04303292
-
SSDEEP
3072:RNYD0o7ELVWeIrnt/Jb03S8Me2lqO7Z/n18wzA0HFIy:UYueIrndei82nh18wsi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5040 Etufya.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Etufya.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a.exe File created C:\Windows\Etufya.exe b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a.exe File opened for modification C:\Windows\Etufya.exe b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Etufya.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main Etufya.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\International Etufya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe 5040 Etufya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4572 wrote to memory of 5040 4572 b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a.exe 82 PID 4572 wrote to memory of 5040 4572 b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a.exe 82 PID 4572 wrote to memory of 5040 4572 b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a.exe"C:\Users\Admin\AppData\Local\Temp\b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\Etufya.exeC:\Windows\Etufya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD57b70334ddda675512efc3eff1bb9fc6e
SHA1ba1a09b14bb6599821e453be97f326d03a153ee2
SHA256b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a
SHA512275ad9c7e5de0383a61f0eaf114e5aee523672a635bbe26ece18fab9e439087e5aa422fc9c0e97c3f5bae8b1f0df5582040d9b6694dc8e8e7923ed7d04303292
-
Filesize
148KB
MD57b70334ddda675512efc3eff1bb9fc6e
SHA1ba1a09b14bb6599821e453be97f326d03a153ee2
SHA256b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a
SHA512275ad9c7e5de0383a61f0eaf114e5aee523672a635bbe26ece18fab9e439087e5aa422fc9c0e97c3f5bae8b1f0df5582040d9b6694dc8e8e7923ed7d04303292
-
Filesize
426B
MD5c03b016032db97cd62ed3685b2f1e63e
SHA161e8b7c13b39bf7d27b5c89f8b306b48f56640d3
SHA2562ba75c66cb5934d437c1a00a5cb5519cd0464bf664f7bab47d4628cc29b6ff4c
SHA512920a22d5e9ed37d46e50830f23fb4c671e2e7aed68f1080b7e931ff073c92b1bf4660b6d97a5ad4f5842bd78fb4ebe8bf9da9e1dd054f78a59a53ff0f0153acc