Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15/10/2023, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
cf274f67421bbb1738a41d89f971cdb0_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cf274f67421bbb1738a41d89f971cdb0_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
cf274f67421bbb1738a41d89f971cdb0_exe32.exe
-
Size
208KB
-
MD5
cf274f67421bbb1738a41d89f971cdb0
-
SHA1
d613f67bad5b981f576066acf8ba34f41371bb40
-
SHA256
4d72001a677ed4813f3e2dbff0cc77761f51796c0917050bb59eacc17d8d40b2
-
SHA512
661c0f9f2fa2ba41d018309a8f5d57514409771909b47a6c0648a9784870fc74147383726264204728187b1bc67b4c28f55a0b262f2bc70a1b58bc997be5b7d6
-
SSDEEP
3072:RhWzi7s/Jkug/mBHRasC7KY11IW20ALoE5NPp5+T2WM/+z4NLthEjQT6j:RhYSJ/mlMXKY11hxE5Bp5+aWhQEj1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2868 UNLPQ.exe -
Loads dropped DLL 2 IoCs
pid Process 2564 cmd.exe 2564 cmd.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\windows\SysWOW64\UNLPQ.exe cf274f67421bbb1738a41d89f971cdb0_exe32.exe File opened for modification C:\windows\SysWOW64\UNLPQ.exe cf274f67421bbb1738a41d89f971cdb0_exe32.exe File created C:\windows\SysWOW64\UNLPQ.exe.bat cf274f67421bbb1738a41d89f971cdb0_exe32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1720 cf274f67421bbb1738a41d89f971cdb0_exe32.exe 2868 UNLPQ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1720 cf274f67421bbb1738a41d89f971cdb0_exe32.exe 1720 cf274f67421bbb1738a41d89f971cdb0_exe32.exe 2868 UNLPQ.exe 2868 UNLPQ.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2564 1720 cf274f67421bbb1738a41d89f971cdb0_exe32.exe 30 PID 1720 wrote to memory of 2564 1720 cf274f67421bbb1738a41d89f971cdb0_exe32.exe 30 PID 1720 wrote to memory of 2564 1720 cf274f67421bbb1738a41d89f971cdb0_exe32.exe 30 PID 1720 wrote to memory of 2564 1720 cf274f67421bbb1738a41d89f971cdb0_exe32.exe 30 PID 2564 wrote to memory of 2868 2564 cmd.exe 28 PID 2564 wrote to memory of 2868 2564 cmd.exe 28 PID 2564 wrote to memory of 2868 2564 cmd.exe 28 PID 2564 wrote to memory of 2868 2564 cmd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf274f67421bbb1738a41d89f971cdb0_exe32.exe"C:\Users\Admin\AppData\Local\Temp\cf274f67421bbb1738a41d89f971cdb0_exe32.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\system32\UNLPQ.exe.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2564
-
-
C:\windows\SysWOW64\UNLPQ.exeC:\windows\system32\UNLPQ.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD5f0833be2d90622f0fc8319409da20b0b
SHA1e055ca328fd289d43a70ac69f45aa8f9297a64f4
SHA2564173e3fa6c132810f4c8e9b559fa941fe958395358025e2235519139c198dfc7
SHA512f09355f7b59057c9fc4bbc4ba347b1faa552929727fb315d29c34768e8bdcb475bd0847623fca02e76c9d1f88857f510e139ad5f57011a507503989622263a77
-
Filesize
74B
MD5e533fdc272450e28c90ddbfa4c2f6546
SHA1bb026029645c0c8a7339d41ca2e4cecc0fcedb6c
SHA25657dbf6211fb08b75b00b86d2a0fd37edc16b0bf3b8dd6ffed4348f158d31d32f
SHA5120e27a153fa1a2a74ad516f0dc3637b193d36e7f7d524f2fea7098933650fe5381f5e9db317e05c7abae136a9aad01358c5ae5d050d9175c90ffa12b7b60435ad
-
Filesize
208KB
MD5f0833be2d90622f0fc8319409da20b0b
SHA1e055ca328fd289d43a70ac69f45aa8f9297a64f4
SHA2564173e3fa6c132810f4c8e9b559fa941fe958395358025e2235519139c198dfc7
SHA512f09355f7b59057c9fc4bbc4ba347b1faa552929727fb315d29c34768e8bdcb475bd0847623fca02e76c9d1f88857f510e139ad5f57011a507503989622263a77
-
Filesize
74B
MD5e533fdc272450e28c90ddbfa4c2f6546
SHA1bb026029645c0c8a7339d41ca2e4cecc0fcedb6c
SHA25657dbf6211fb08b75b00b86d2a0fd37edc16b0bf3b8dd6ffed4348f158d31d32f
SHA5120e27a153fa1a2a74ad516f0dc3637b193d36e7f7d524f2fea7098933650fe5381f5e9db317e05c7abae136a9aad01358c5ae5d050d9175c90ffa12b7b60435ad
-
Filesize
208KB
MD5f0833be2d90622f0fc8319409da20b0b
SHA1e055ca328fd289d43a70ac69f45aa8f9297a64f4
SHA2564173e3fa6c132810f4c8e9b559fa941fe958395358025e2235519139c198dfc7
SHA512f09355f7b59057c9fc4bbc4ba347b1faa552929727fb315d29c34768e8bdcb475bd0847623fca02e76c9d1f88857f510e139ad5f57011a507503989622263a77
-
Filesize
208KB
MD5f0833be2d90622f0fc8319409da20b0b
SHA1e055ca328fd289d43a70ac69f45aa8f9297a64f4
SHA2564173e3fa6c132810f4c8e9b559fa941fe958395358025e2235519139c198dfc7
SHA512f09355f7b59057c9fc4bbc4ba347b1faa552929727fb315d29c34768e8bdcb475bd0847623fca02e76c9d1f88857f510e139ad5f57011a507503989622263a77