Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 16:02
Behavioral task
behavioral1
Sample
7b15cd38555854481e1a671b7bb69e3e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b15cd38555854481e1a671b7bb69e3e.exe
Resource
win10v2004-20231222-en
General
-
Target
7b15cd38555854481e1a671b7bb69e3e.exe
-
Size
223KB
-
MD5
7b15cd38555854481e1a671b7bb69e3e
-
SHA1
f0712727d0dc4dcd4a388289a31e751cd2197187
-
SHA256
23a98bb8683ecbadee3064d0a44c65c072024bf6a666e724a6dabb2c6dc9ffd7
-
SHA512
ed6f50859555434b2d58033400037edad0ca3bcc85fc71ababa5877568ba448775ef2de1793b0537411947f4b1ae43ffec0be570fb9c0f251a663381543ef528
-
SSDEEP
6144:al7hRvEGGmcjRXtS5kikL2UF5KA/Jfjk4+Red3:qxEfmERmkiD7A/Jfjx+RQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1644 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2440 ugtak.exe -
Loads dropped DLL 2 IoCs
pid Process 2052 7b15cd38555854481e1a671b7bb69e3e.exe 2052 7b15cd38555854481e1a671b7bb69e3e.exe -
resource yara_rule behavioral1/memory/2052-0-0x0000000000400000-0x0000000000813000-memory.dmp upx behavioral1/files/0x000a00000001225c-6.dat upx behavioral1/memory/2440-16-0x0000000000400000-0x0000000000813000-memory.dmp upx behavioral1/memory/2052-8-0x0000000007780000-0x0000000007B93000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\{6CF0A0C8-CEE0-AD4E-46DF-EAE75CAEC9FA} = "C:\\Users\\Admin\\AppData\\Roaming\\Haro\\ugtak.exe" ugtak.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2052 set thread context of 1644 2052 7b15cd38555854481e1a671b7bb69e3e.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Privacy 7b15cd38555854481e1a671b7bb69e3e.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 7b15cd38555854481e1a671b7bb69e3e.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe 2440 ugtak.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2052 7b15cd38555854481e1a671b7bb69e3e.exe Token: SeSecurityPrivilege 2052 7b15cd38555854481e1a671b7bb69e3e.exe Token: SeSecurityPrivilege 2052 7b15cd38555854481e1a671b7bb69e3e.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2440 2052 7b15cd38555854481e1a671b7bb69e3e.exe 28 PID 2052 wrote to memory of 2440 2052 7b15cd38555854481e1a671b7bb69e3e.exe 28 PID 2052 wrote to memory of 2440 2052 7b15cd38555854481e1a671b7bb69e3e.exe 28 PID 2052 wrote to memory of 2440 2052 7b15cd38555854481e1a671b7bb69e3e.exe 28 PID 2440 wrote to memory of 1256 2440 ugtak.exe 10 PID 2440 wrote to memory of 1256 2440 ugtak.exe 10 PID 2440 wrote to memory of 1256 2440 ugtak.exe 10 PID 2440 wrote to memory of 1256 2440 ugtak.exe 10 PID 2440 wrote to memory of 1256 2440 ugtak.exe 10 PID 2440 wrote to memory of 1340 2440 ugtak.exe 9 PID 2440 wrote to memory of 1340 2440 ugtak.exe 9 PID 2440 wrote to memory of 1340 2440 ugtak.exe 9 PID 2440 wrote to memory of 1340 2440 ugtak.exe 9 PID 2440 wrote to memory of 1340 2440 ugtak.exe 9 PID 2440 wrote to memory of 1404 2440 ugtak.exe 3 PID 2440 wrote to memory of 1404 2440 ugtak.exe 3 PID 2440 wrote to memory of 1404 2440 ugtak.exe 3 PID 2440 wrote to memory of 1404 2440 ugtak.exe 3 PID 2440 wrote to memory of 1404 2440 ugtak.exe 3 PID 2440 wrote to memory of 2520 2440 ugtak.exe 7 PID 2440 wrote to memory of 2520 2440 ugtak.exe 7 PID 2440 wrote to memory of 2520 2440 ugtak.exe 7 PID 2440 wrote to memory of 2520 2440 ugtak.exe 7 PID 2440 wrote to memory of 2520 2440 ugtak.exe 7 PID 2440 wrote to memory of 2052 2440 ugtak.exe 27 PID 2440 wrote to memory of 2052 2440 ugtak.exe 27 PID 2440 wrote to memory of 2052 2440 ugtak.exe 27 PID 2440 wrote to memory of 2052 2440 ugtak.exe 27 PID 2440 wrote to memory of 2052 2440 ugtak.exe 27 PID 2052 wrote to memory of 1644 2052 7b15cd38555854481e1a671b7bb69e3e.exe 29 PID 2052 wrote to memory of 1644 2052 7b15cd38555854481e1a671b7bb69e3e.exe 29 PID 2052 wrote to memory of 1644 2052 7b15cd38555854481e1a671b7bb69e3e.exe 29 PID 2052 wrote to memory of 1644 2052 7b15cd38555854481e1a671b7bb69e3e.exe 29 PID 2052 wrote to memory of 1644 2052 7b15cd38555854481e1a671b7bb69e3e.exe 29 PID 2052 wrote to memory of 1644 2052 7b15cd38555854481e1a671b7bb69e3e.exe 29 PID 2052 wrote to memory of 1644 2052 7b15cd38555854481e1a671b7bb69e3e.exe 29 PID 2052 wrote to memory of 1644 2052 7b15cd38555854481e1a671b7bb69e3e.exe 29 PID 2052 wrote to memory of 1644 2052 7b15cd38555854481e1a671b7bb69e3e.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\7b15cd38555854481e1a671b7bb69e3e.exe"C:\Users\Admin\AppData\Local\Temp\7b15cd38555854481e1a671b7bb69e3e.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Roaming\Haro\ugtak.exe"C:\Users\Admin\AppData\Roaming\Haro\ugtak.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp71017061.bat"3⤵
- Deletes itself
PID:1644
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2520
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1340
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD5324648c6c9cd283d35219b140c08440d
SHA17fdad0ef926b40cea2cfa3ccddad1d9258194a06
SHA256debea47002481176ea7a812abbf2f3e4875b4704c136f37c37096fbfcd1a185e
SHA512a0052b712fc196243c4255911f865bb1282362f9f45a69a65ded5ddfb65fa7923ecfb758afc4ce796c90de933dd4e8a37c99b529c5b6f38301da1e8dd6c15be6
-
Filesize
366B
MD580ec17d467a6f96f54316d8b16039bdd
SHA1a289dd9d422d8cec66f73b9ed704cf5ee2b985c4
SHA256e46e5cbb17d0d849d2de000630860516d3fce19f6ab0218364d8821e079e66e3
SHA512fd1d3a0d7de81c088cad4b2be014f5bbc9a22f7a205a99215182cb1e805925f50e8eb453bfbdef92ccd57e3c4cfc00385d83a2da2b1a4d59c5ed6cc3bbf32eb5
-
Filesize
223KB
MD5b1f1fdf0eb706831d86dff0f27a9b173
SHA19b4d89969a842c064c0ca9332617448356648be8
SHA256774630e38e692e016b3477bd305c231635298adda4d4ce4c8cc6e0f7eeb92090
SHA512f4e5325897ce8975a174973a1bb4657ce7905d07cafd3c026b099adc1f60b3eb3225edbb59aea61ba373ca933a4213218a27fcb473fb41d3084c22f3430ddc3b