Analysis
-
max time kernel
137s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
632e614896158c3011c616bd2f6695e6.exe
Resource
win7-20231129-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
632e614896158c3011c616bd2f6695e6.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
632e614896158c3011c616bd2f6695e6.exe
-
Size
414KB
-
MD5
632e614896158c3011c616bd2f6695e6
-
SHA1
8c1098a9599ee4102a0ecb00d44b5aad24c03145
-
SHA256
54f7c10156e84b037139f2de4762673b6fa87597a574a8724cf1cf22b1a5af42
-
SHA512
64cd6b280ef0c63203f3d78af0bd44f12c77f32acde74c6bf3db6cb07c61b845e56c44cddabb5515a0b5097e86fe29f79c70c94ea3a75ee0ff256e2952434c4f
-
SSDEEP
6144:u5CFwkzdy8ly0ZYv56234BBWDoP1e6A6CJsaE+N8PVT5BcOsfwm:++wqdyjEYv562IADoP1pJ4YBBWwm
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1520 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 iwup.exe -
Loads dropped DLL 2 IoCs
pid Process 3020 632e614896158c3011c616bd2f6695e6.exe 3020 632e614896158c3011c616bd2f6695e6.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\{E705BD28-DA76-AD4E-D262-B4D1F82197CC} = "C:\\Users\\Admin\\AppData\\Roaming\\Ewyxji\\iwup.exe" iwup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3020 set thread context of 1520 3020 632e614896158c3011c616bd2f6695e6.exe 14 -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe 2192 iwup.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3020 632e614896158c3011c616bd2f6695e6.exe 2192 iwup.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2192 3020 632e614896158c3011c616bd2f6695e6.exe 16 PID 3020 wrote to memory of 2192 3020 632e614896158c3011c616bd2f6695e6.exe 16 PID 3020 wrote to memory of 2192 3020 632e614896158c3011c616bd2f6695e6.exe 16 PID 3020 wrote to memory of 2192 3020 632e614896158c3011c616bd2f6695e6.exe 16 PID 2192 wrote to memory of 1228 2192 iwup.exe 25 PID 2192 wrote to memory of 1228 2192 iwup.exe 25 PID 2192 wrote to memory of 1228 2192 iwup.exe 25 PID 2192 wrote to memory of 1228 2192 iwup.exe 25 PID 2192 wrote to memory of 1228 2192 iwup.exe 25 PID 2192 wrote to memory of 1320 2192 iwup.exe 24 PID 2192 wrote to memory of 1320 2192 iwup.exe 24 PID 2192 wrote to memory of 1320 2192 iwup.exe 24 PID 2192 wrote to memory of 1320 2192 iwup.exe 24 PID 2192 wrote to memory of 1320 2192 iwup.exe 24 PID 2192 wrote to memory of 1368 2192 iwup.exe 23 PID 2192 wrote to memory of 1368 2192 iwup.exe 23 PID 2192 wrote to memory of 1368 2192 iwup.exe 23 PID 2192 wrote to memory of 1368 2192 iwup.exe 23 PID 2192 wrote to memory of 1368 2192 iwup.exe 23 PID 2192 wrote to memory of 1948 2192 iwup.exe 21 PID 2192 wrote to memory of 1948 2192 iwup.exe 21 PID 2192 wrote to memory of 1948 2192 iwup.exe 21 PID 2192 wrote to memory of 1948 2192 iwup.exe 21 PID 2192 wrote to memory of 1948 2192 iwup.exe 21 PID 2192 wrote to memory of 3020 2192 iwup.exe 17 PID 2192 wrote to memory of 3020 2192 iwup.exe 17 PID 2192 wrote to memory of 3020 2192 iwup.exe 17 PID 2192 wrote to memory of 3020 2192 iwup.exe 17 PID 2192 wrote to memory of 3020 2192 iwup.exe 17 PID 3020 wrote to memory of 1520 3020 632e614896158c3011c616bd2f6695e6.exe 14 PID 3020 wrote to memory of 1520 3020 632e614896158c3011c616bd2f6695e6.exe 14 PID 3020 wrote to memory of 1520 3020 632e614896158c3011c616bd2f6695e6.exe 14 PID 3020 wrote to memory of 1520 3020 632e614896158c3011c616bd2f6695e6.exe 14 PID 3020 wrote to memory of 1520 3020 632e614896158c3011c616bd2f6695e6.exe 14 PID 3020 wrote to memory of 1520 3020 632e614896158c3011c616bd2f6695e6.exe 14 PID 3020 wrote to memory of 1520 3020 632e614896158c3011c616bd2f6695e6.exe 14 PID 3020 wrote to memory of 1520 3020 632e614896158c3011c616bd2f6695e6.exe 14 PID 3020 wrote to memory of 1520 3020 632e614896158c3011c616bd2f6695e6.exe 14
Processes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp1f73d194.bat"1⤵
- Deletes itself
PID:1520
-
C:\Users\Admin\AppData\Roaming\Ewyxji\iwup.exe"C:\Users\Admin\AppData\Roaming\Ewyxji\iwup.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2192
-
C:\Users\Admin\AppData\Local\Temp\632e614896158c3011c616bd2f6695e6.exe"C:\Users\Admin\AppData\Local\Temp\632e614896158c3011c616bd2f6695e6.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3020
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1948
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1320
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1228