Analysis

  • max time kernel
    149s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2023, 02:17

General

  • Target

    UTES_v2.exe

  • Size

    9.9MB

  • MD5

    6647145d121243aa0afa229377a1d1d1

  • SHA1

    9edc3153a277748103d1a4188f446c0e4e526103

  • SHA256

    e37e702b4d93bd70a885e46ef20ec5d2d7129255fc12e747bb7a7687e29bb520

  • SHA512

    675ae196b05657a0fcf28749fdcff383351272a1bf02bffc1d52d6d4928f855f167ace2b914b686282483f60cdd26d80f787370445fc784605b568c30bb4b2d2

  • SSDEEP

    196608:Zy5x+pMmmd6dp40+pkssG1lhuNrmBr4/4dS/cj1BL5LvBI:gSpMmmM4PksEMrqISkj1BL5LJI

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\UTES_v2.exe
    "C:\Users\Admin\AppData\Local\Temp\UTES_v2.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\utes.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\utes.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4628

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data.dat

          Filesize

          9.2MB

          MD5

          ba18715f5efdd20e64f9b31b223a0978

          SHA1

          13e6cc6c1e203673db1a4fbe1f0c6f509ad0bf3d

          SHA256

          1590385cabff35627f4b93f81d2b6adb004115d49883c56348886608986d528b

          SHA512

          4a414216e06c47acba0947e10e7ab1cca2d7498c9ff2cf18fc96f0006c1a19f94d6b02bc665aa6d76a4d8058307cca4299bd0b94b76d7d21852b0044aae13369

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\DotNetZip.dll

          Filesize

          446KB

          MD5

          2ac40da17c4ac9df4a8701faf3913a52

          SHA1

          f5518fd34d920546bafa8d648aa8feeca3179b93

          SHA256

          46bf5f182875f53994b6bee810570f85b2b39643c27ebbee77ce554b1e3b6ed4

          SHA512

          80025e7f79839138b7365071265bcc6d791a3fac48cecd7d170be79a46016c3fcef928676e666f6798a18c534310e5e27bf7f2896214dc615f0913f5f2798f3f

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\DotNetZip.dll

          Filesize

          446KB

          MD5

          2ac40da17c4ac9df4a8701faf3913a52

          SHA1

          f5518fd34d920546bafa8d648aa8feeca3179b93

          SHA256

          46bf5f182875f53994b6bee810570f85b2b39643c27ebbee77ce554b1e3b6ed4

          SHA512

          80025e7f79839138b7365071265bcc6d791a3fac48cecd7d170be79a46016c3fcef928676e666f6798a18c534310e5e27bf7f2896214dc615f0913f5f2798f3f

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\DotNetZip.dll

          Filesize

          446KB

          MD5

          2ac40da17c4ac9df4a8701faf3913a52

          SHA1

          f5518fd34d920546bafa8d648aa8feeca3179b93

          SHA256

          46bf5f182875f53994b6bee810570f85b2b39643c27ebbee77ce554b1e3b6ed4

          SHA512

          80025e7f79839138b7365071265bcc6d791a3fac48cecd7d170be79a46016c3fcef928676e666f6798a18c534310e5e27bf7f2896214dc615f0913f5f2798f3f

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\utes.exe

          Filesize

          78KB

          MD5

          6ce964c6ce942e6f3ced8436b8e8a4b6

          SHA1

          f20e9ef54ef0d4469a354b53bcdc8cd62349b9c3

          SHA256

          03470192783afcf409dfdf125cbd359c88bd83c5e22d5a24d3386bd3500031c7

          SHA512

          07a79bbb5ca451965f53f5e498192006b00f624625701a7f87bde8e1eaa96f32f46182109a7e38baa243d3959431b0eadd079b54fdae673532d71d330db9a0e8

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\utes.exe

          Filesize

          78KB

          MD5

          6ce964c6ce942e6f3ced8436b8e8a4b6

          SHA1

          f20e9ef54ef0d4469a354b53bcdc8cd62349b9c3

          SHA256

          03470192783afcf409dfdf125cbd359c88bd83c5e22d5a24d3386bd3500031c7

          SHA512

          07a79bbb5ca451965f53f5e498192006b00f624625701a7f87bde8e1eaa96f32f46182109a7e38baa243d3959431b0eadd079b54fdae673532d71d330db9a0e8

        • memory/4628-135-0x0000000000CD0000-0x0000000000CEC000-memory.dmp

          Filesize

          112KB

        • memory/4628-139-0x0000000003110000-0x000000000311A000-memory.dmp

          Filesize

          40KB

        • memory/4628-140-0x0000000005770000-0x00000000057C6000-memory.dmp

          Filesize

          344KB

        • memory/4628-138-0x00000000056D0000-0x0000000005762000-memory.dmp

          Filesize

          584KB

        • memory/4628-144-0x0000000008000000-0x0000000008076000-memory.dmp

          Filesize

          472KB

        • memory/4628-137-0x0000000005BE0000-0x0000000006184000-memory.dmp

          Filesize

          5.6MB

        • memory/4628-136-0x0000000005590000-0x000000000562C000-memory.dmp

          Filesize

          624KB