Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
uuFax_Setup.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
uuFax_Setup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20231222-en
General
-
Target
uuFax_Setup.exe
-
Size
1.9MB
-
MD5
9f1f81dfd807b6749281f1c2aeac4207
-
SHA1
fd8c0e43530248be12ab48ee6e34ac2c69007096
-
SHA256
50315111cdda11473c6a061c5caeb01364a881b1fb251244d1f38d38063e5339
-
SHA512
31bbdd62d8f87fa3cc81b95dadd3542bf0b7a2e7ee114fc67ceb71c921ad847b61a888d12e5a54a70ac7a9f47b29943feb4b1c8b9f6d026419958f2f003d9612
-
SSDEEP
49152:D2dxcN7uw/FXli9aNfVLSxxEyaNtCN4mWC+lMJsO/M:q/cte9aNcxxEltXl+/M
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0006000000023222-16.dat aspack_v212_v242 behavioral2/files/0x0006000000023222-14.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2456 uuFax_Setup.tmp -
Loads dropped DLL 2 IoCs
pid Process 2456 uuFax_Setup.tmp 2456 uuFax_Setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4940 wrote to memory of 2456 4940 uuFax_Setup.exe 16 PID 4940 wrote to memory of 2456 4940 uuFax_Setup.exe 16 PID 4940 wrote to memory of 2456 4940 uuFax_Setup.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\uuFax_Setup.exe"C:\Users\Admin\AppData\Local\Temp\uuFax_Setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\is-F9QC5.tmp\uuFax_Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-F9QC5.tmp\uuFax_Setup.tmp" /SL5="$A008E,1785023,52224,C:\Users\Admin\AppData\Local\Temp\uuFax_Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5fed4a3b79f8fc6dccdb296cd968c72d4
SHA104aefc764f6de4ef7d5dc4a3694b41c07f320e35
SHA256dcff5035e29732e4de86880f88ddfe957b36ecae471c43b2813fae18d95849ac
SHA512427cc94f758e4da738134682598b2dbac59356251b1af8de8c52867692a964d88941b3e9e4e76dfc79b675588896a3a13415669f34510577bbf8463fa69e180f
-
Filesize
39KB
MD59a67d9440c6eb24d865366b87978358d
SHA18d35e4a431497a6253da709684fbe0277f297542
SHA256c28ebe568c9689c10c9d970c519f996739355abd933731a17e23e4cecbea5f14
SHA512ae0d8a87ef25cbdd1476b8e70879709dc8b59f95025d0ff22c7444e0ff2e1e2d583edb0f2f819435f48aec5893a112916da3c4d342c8d6a3b422c24e9e853698
-
Filesize
152KB
MD5d09abf3182669432f77896d0911fd017
SHA1270bb5dbb43563dcf6ace5fc54289dc8bc149364
SHA256ad4bd84979bd7486cb20bdc52fa19a0210d62528248cfe95ead6e72416f74e78
SHA5121fe6c6aff6aaf159c43a81bd99c6069e6d13d4c4afd5e1df6f8ab5fcd5b5ef30eb3180e71949908a216096ef6323000447c4429a8a7c7bbab6b5aa0d588fabe3
-
Filesize
138KB
MD596dd9d416ef098087070c7e9906e0961
SHA13f754471cade2f0906a56303e7ba3d78eaa02edd
SHA256bd10bc48134acd1ae5bf5ed0fe15d4c505795159b26d6f077596a9020e64503e
SHA512f0ef1bd7dcb7c0518d159dfa7c4d6e84599cc8caeeaf9f711b8824add8bb8071a46b2d746611fff582daf7387fd89bc1c1278d93fe28a1af4ac0fb3e945be5f3