Analysis
-
max time kernel
244s -
max time network
256s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
26-11-2023 22:36
Static task
static1
Behavioral task
behavioral1
Sample
dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a.exe
Resource
win10-20231020-en
General
-
Target
dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a.exe
-
Size
5.4MB
-
MD5
a833ac03e32636fc362245a98a1db5d8
-
SHA1
b16b486c311b8082c9d6ec9dbcc7c9b417d607fb
-
SHA256
dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a
-
SHA512
661a748a94804a6cbf9dadcc66d509e49e121da9c72b35deb816889c2909d6371b20a3c25ce1efba41ba6a07e40b851bb377609690b11c1d4815dc7561e77bfa
-
SSDEEP
98304:8vcG8JpZVHAa5RjlsDWVynuSonGw6SGYQzIObVAjWeJiuj9133vWhUZR1:8dMXBjp09AR6EQzEfb/fR1
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 1488 Utsysc.exe 3684 Utsysc.exe 3328 Utsysc.exe 4568 Utsysc.exe 788 Utsysc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3240 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2360 dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a.exe 2360 dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a.exe 1488 Utsysc.exe 1488 Utsysc.exe 3684 Utsysc.exe 3684 Utsysc.exe 3328 Utsysc.exe 3328 Utsysc.exe 4568 Utsysc.exe 4568 Utsysc.exe 788 Utsysc.exe 788 Utsysc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1488 2360 dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a.exe 71 PID 2360 wrote to memory of 1488 2360 dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a.exe 71 PID 2360 wrote to memory of 1488 2360 dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a.exe 71 PID 1488 wrote to memory of 3240 1488 Utsysc.exe 72 PID 1488 wrote to memory of 3240 1488 Utsysc.exe 72 PID 1488 wrote to memory of 3240 1488 Utsysc.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a.exe"C:\Users\Admin\AppData\Local\Temp\dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:3240
-
-
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3328
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD5a833ac03e32636fc362245a98a1db5d8
SHA1b16b486c311b8082c9d6ec9dbcc7c9b417d607fb
SHA256dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a
SHA512661a748a94804a6cbf9dadcc66d509e49e121da9c72b35deb816889c2909d6371b20a3c25ce1efba41ba6a07e40b851bb377609690b11c1d4815dc7561e77bfa
-
Filesize
5.4MB
MD5a833ac03e32636fc362245a98a1db5d8
SHA1b16b486c311b8082c9d6ec9dbcc7c9b417d607fb
SHA256dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a
SHA512661a748a94804a6cbf9dadcc66d509e49e121da9c72b35deb816889c2909d6371b20a3c25ce1efba41ba6a07e40b851bb377609690b11c1d4815dc7561e77bfa
-
Filesize
5.4MB
MD5a833ac03e32636fc362245a98a1db5d8
SHA1b16b486c311b8082c9d6ec9dbcc7c9b417d607fb
SHA256dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a
SHA512661a748a94804a6cbf9dadcc66d509e49e121da9c72b35deb816889c2909d6371b20a3c25ce1efba41ba6a07e40b851bb377609690b11c1d4815dc7561e77bfa
-
Filesize
5.4MB
MD5a833ac03e32636fc362245a98a1db5d8
SHA1b16b486c311b8082c9d6ec9dbcc7c9b417d607fb
SHA256dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a
SHA512661a748a94804a6cbf9dadcc66d509e49e121da9c72b35deb816889c2909d6371b20a3c25ce1efba41ba6a07e40b851bb377609690b11c1d4815dc7561e77bfa
-
Filesize
5.4MB
MD5a833ac03e32636fc362245a98a1db5d8
SHA1b16b486c311b8082c9d6ec9dbcc7c9b417d607fb
SHA256dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a
SHA512661a748a94804a6cbf9dadcc66d509e49e121da9c72b35deb816889c2909d6371b20a3c25ce1efba41ba6a07e40b851bb377609690b11c1d4815dc7561e77bfa
-
Filesize
5.4MB
MD5a833ac03e32636fc362245a98a1db5d8
SHA1b16b486c311b8082c9d6ec9dbcc7c9b417d607fb
SHA256dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a
SHA512661a748a94804a6cbf9dadcc66d509e49e121da9c72b35deb816889c2909d6371b20a3c25ce1efba41ba6a07e40b851bb377609690b11c1d4815dc7561e77bfa
-
Filesize
5.4MB
MD5a833ac03e32636fc362245a98a1db5d8
SHA1b16b486c311b8082c9d6ec9dbcc7c9b417d607fb
SHA256dbb847ea6b20254f86ce62ec96de831295334adc2328ae9818adc7576acccd6a
SHA512661a748a94804a6cbf9dadcc66d509e49e121da9c72b35deb816889c2909d6371b20a3c25ce1efba41ba6a07e40b851bb377609690b11c1d4815dc7561e77bfa