Analysis
-
max time kernel
145s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 11:15
Static task
static1
Behavioral task
behavioral1
Sample
925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe
Resource
win7-20230831-en
General
-
Target
925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe
-
Size
7.6MB
-
MD5
1c9f3c0258e923c07e1943498c789a3d
-
SHA1
e908faaa5eff19c6b653241253ecc6f28c83f436
-
SHA256
925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55
-
SHA512
92c16e56ae3d830e2110f97159d6f19fbf91b8bc56d29be207a0da12bd388a0fe68dd13c63dba5266d7d48be9f423d75c1e1e3ec16e6ad1458940f0bb0d0cb0b
-
SSDEEP
196608:o9/4OSUKi7eAGR6EGOUqJNTUQ0uG2DWMyoim06EV5X:U/4OSZeeLcvqJNF0uJW3/HX
Malware Config
Extracted
bitrat
1.38
185.225.75.68:3569
-
communication_password
0edcbe7d888380c49e7d1dcf67b6ea6e
-
tor_process
tor
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 5000 uno.exe 828 uno.exe 1784 uno.exe 4384 uno.exe 4844 uno.exe 2660 uno.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 828 uno.exe 828 uno.exe 828 uno.exe 828 uno.exe 2660 uno.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3576 set thread context of 3668 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 84 PID 5000 set thread context of 828 5000 uno.exe 100 PID 1784 set thread context of 4384 1784 uno.exe 114 PID 4844 set thread context of 2660 4844 uno.exe 124 -
Program crash 2 IoCs
pid pid_target Process procid_target 3028 3668 WerFault.exe 84 484 4384 WerFault.exe 114 -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2824 schtasks.exe 1332 schtasks.exe 2268 schtasks.exe 4372 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 828 uno.exe Token: SeShutdownPrivilege 2660 uno.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 828 uno.exe 828 uno.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3576 wrote to memory of 3668 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 84 PID 3576 wrote to memory of 3668 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 84 PID 3576 wrote to memory of 3668 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 84 PID 3576 wrote to memory of 3668 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 84 PID 3576 wrote to memory of 3668 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 84 PID 3576 wrote to memory of 3668 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 84 PID 3576 wrote to memory of 3668 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 84 PID 3576 wrote to memory of 3668 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 84 PID 3576 wrote to memory of 3668 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 84 PID 3576 wrote to memory of 3668 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 84 PID 3576 wrote to memory of 3668 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 84 PID 3576 wrote to memory of 1360 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 86 PID 3576 wrote to memory of 1360 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 86 PID 3576 wrote to memory of 1360 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 86 PID 3576 wrote to memory of 3132 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 88 PID 3576 wrote to memory of 3132 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 88 PID 3576 wrote to memory of 3132 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 88 PID 3576 wrote to memory of 4016 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 90 PID 3576 wrote to memory of 4016 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 90 PID 3576 wrote to memory of 4016 3576 925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe 90 PID 3132 wrote to memory of 4372 3132 cmd.exe 93 PID 3132 wrote to memory of 4372 3132 cmd.exe 93 PID 3132 wrote to memory of 4372 3132 cmd.exe 93 PID 5000 wrote to memory of 828 5000 uno.exe 100 PID 5000 wrote to memory of 828 5000 uno.exe 100 PID 5000 wrote to memory of 828 5000 uno.exe 100 PID 5000 wrote to memory of 828 5000 uno.exe 100 PID 5000 wrote to memory of 828 5000 uno.exe 100 PID 5000 wrote to memory of 828 5000 uno.exe 100 PID 5000 wrote to memory of 828 5000 uno.exe 100 PID 5000 wrote to memory of 828 5000 uno.exe 100 PID 5000 wrote to memory of 828 5000 uno.exe 100 PID 5000 wrote to memory of 828 5000 uno.exe 100 PID 5000 wrote to memory of 828 5000 uno.exe 100 PID 5000 wrote to memory of 3724 5000 uno.exe 106 PID 5000 wrote to memory of 3724 5000 uno.exe 106 PID 5000 wrote to memory of 3724 5000 uno.exe 106 PID 5000 wrote to memory of 2640 5000 uno.exe 101 PID 5000 wrote to memory of 2640 5000 uno.exe 101 PID 5000 wrote to memory of 2640 5000 uno.exe 101 PID 5000 wrote to memory of 460 5000 uno.exe 102 PID 5000 wrote to memory of 460 5000 uno.exe 102 PID 5000 wrote to memory of 460 5000 uno.exe 102 PID 2640 wrote to memory of 2824 2640 cmd.exe 108 PID 2640 wrote to memory of 2824 2640 cmd.exe 108 PID 2640 wrote to memory of 2824 2640 cmd.exe 108 PID 1784 wrote to memory of 4384 1784 uno.exe 114 PID 1784 wrote to memory of 4384 1784 uno.exe 114 PID 1784 wrote to memory of 4384 1784 uno.exe 114 PID 1784 wrote to memory of 4384 1784 uno.exe 114 PID 1784 wrote to memory of 4384 1784 uno.exe 114 PID 1784 wrote to memory of 4384 1784 uno.exe 114 PID 1784 wrote to memory of 4384 1784 uno.exe 114 PID 1784 wrote to memory of 4384 1784 uno.exe 114 PID 1784 wrote to memory of 4384 1784 uno.exe 114 PID 1784 wrote to memory of 4384 1784 uno.exe 114 PID 1784 wrote to memory of 4384 1784 uno.exe 114 PID 1784 wrote to memory of 2708 1784 uno.exe 113 PID 1784 wrote to memory of 2708 1784 uno.exe 113 PID 1784 wrote to memory of 2708 1784 uno.exe 113 PID 1784 wrote to memory of 4364 1784 uno.exe 115 PID 1784 wrote to memory of 4364 1784 uno.exe 115 PID 1784 wrote to memory of 4364 1784 uno.exe 115 PID 1784 wrote to memory of 3976 1784 uno.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe"C:\Users\Admin\AppData\Local\Temp\925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe"C:\Users\Admin\AppData\Local\Temp\925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe"2⤵PID:3668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 1883⤵
- Program crash
PID:3028
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\uno"2⤵PID:1360
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\uno\uno.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\uno\uno.exe'" /f3⤵
- Creates scheduled task(s)
PID:4372
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55.exe" "C:\Users\Admin\AppData\Roaming\uno\uno.exe"2⤵PID:4016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3668 -ip 36681⤵PID:4692
-
C:\Users\Admin\AppData\Roaming\uno\uno.exeC:\Users\Admin\AppData\Roaming\uno\uno.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Roaming\uno\uno.exe"C:\Users\Admin\AppData\Roaming\uno\uno.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:828
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\uno\uno.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\uno\uno.exe'" /f3⤵
- Creates scheduled task(s)
PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\uno\uno.exe" "C:\Users\Admin\AppData\Roaming\uno\uno.exe"2⤵PID:460
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\uno"2⤵PID:3724
-
-
C:\Users\Admin\AppData\Roaming\uno\uno.exeC:\Users\Admin\AppData\Roaming\uno\uno.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\uno"2⤵PID:2708
-
-
C:\Users\Admin\AppData\Roaming\uno\uno.exe"C:\Users\Admin\AppData\Roaming\uno\uno.exe"2⤵
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 1883⤵
- Program crash
PID:484
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\uno\uno.exe'" /f2⤵PID:4364
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\uno\uno.exe'" /f3⤵
- Creates scheduled task(s)
PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\uno\uno.exe" "C:\Users\Admin\AppData\Roaming\uno\uno.exe"2⤵PID:3976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4384 -ip 43841⤵PID:2164
-
C:\Users\Admin\AppData\Roaming\uno\uno.exeC:\Users\Admin\AppData\Roaming\uno\uno.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4844 -
C:\Users\Admin\AppData\Roaming\uno\uno.exe"C:\Users\Admin\AppData\Roaming\uno\uno.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\uno\uno.exe'" /f2⤵PID:4872
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\uno\uno.exe'" /f3⤵
- Creates scheduled task(s)
PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\uno"2⤵PID:4812
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\uno\uno.exe" "C:\Users\Admin\AppData\Roaming\uno\uno.exe"2⤵PID:5004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520B
MD503febbff58da1d3318c31657d89c8542
SHA1c9e017bd9d0a4fe533795b227c855935d86c2092
SHA2565164770a37b199a79ccd23b399bb3309228973d9f74c589bc2623dc613b37ac4
SHA5123750c372bbca1892e9c1b34681d592c693e725a8b149c3d6938079cd467628cec42c4293b0d886b57a786abf45f5e7229247b3445001774e3e793ff5a3accfa3
-
Filesize
7.6MB
MD51c9f3c0258e923c07e1943498c789a3d
SHA1e908faaa5eff19c6b653241253ecc6f28c83f436
SHA256925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55
SHA51292c16e56ae3d830e2110f97159d6f19fbf91b8bc56d29be207a0da12bd388a0fe68dd13c63dba5266d7d48be9f423d75c1e1e3ec16e6ad1458940f0bb0d0cb0b
-
Filesize
7.6MB
MD51c9f3c0258e923c07e1943498c789a3d
SHA1e908faaa5eff19c6b653241253ecc6f28c83f436
SHA256925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55
SHA51292c16e56ae3d830e2110f97159d6f19fbf91b8bc56d29be207a0da12bd388a0fe68dd13c63dba5266d7d48be9f423d75c1e1e3ec16e6ad1458940f0bb0d0cb0b
-
Filesize
7.6MB
MD51c9f3c0258e923c07e1943498c789a3d
SHA1e908faaa5eff19c6b653241253ecc6f28c83f436
SHA256925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55
SHA51292c16e56ae3d830e2110f97159d6f19fbf91b8bc56d29be207a0da12bd388a0fe68dd13c63dba5266d7d48be9f423d75c1e1e3ec16e6ad1458940f0bb0d0cb0b
-
Filesize
7.6MB
MD51c9f3c0258e923c07e1943498c789a3d
SHA1e908faaa5eff19c6b653241253ecc6f28c83f436
SHA256925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55
SHA51292c16e56ae3d830e2110f97159d6f19fbf91b8bc56d29be207a0da12bd388a0fe68dd13c63dba5266d7d48be9f423d75c1e1e3ec16e6ad1458940f0bb0d0cb0b
-
Filesize
7.6MB
MD51c9f3c0258e923c07e1943498c789a3d
SHA1e908faaa5eff19c6b653241253ecc6f28c83f436
SHA256925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55
SHA51292c16e56ae3d830e2110f97159d6f19fbf91b8bc56d29be207a0da12bd388a0fe68dd13c63dba5266d7d48be9f423d75c1e1e3ec16e6ad1458940f0bb0d0cb0b
-
Filesize
7.6MB
MD51c9f3c0258e923c07e1943498c789a3d
SHA1e908faaa5eff19c6b653241253ecc6f28c83f436
SHA256925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55
SHA51292c16e56ae3d830e2110f97159d6f19fbf91b8bc56d29be207a0da12bd388a0fe68dd13c63dba5266d7d48be9f423d75c1e1e3ec16e6ad1458940f0bb0d0cb0b
-
Filesize
7.6MB
MD51c9f3c0258e923c07e1943498c789a3d
SHA1e908faaa5eff19c6b653241253ecc6f28c83f436
SHA256925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55
SHA51292c16e56ae3d830e2110f97159d6f19fbf91b8bc56d29be207a0da12bd388a0fe68dd13c63dba5266d7d48be9f423d75c1e1e3ec16e6ad1458940f0bb0d0cb0b