Analysis
-
max time kernel
1s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
28028a7cd9a23bde1b0029e6148af986.exe
Resource
win7-20231215-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
28028a7cd9a23bde1b0029e6148af986.exe
Resource
win10v2004-20231215-en
8 signatures
150 seconds
General
-
Target
28028a7cd9a23bde1b0029e6148af986.exe
-
Size
180KB
-
MD5
28028a7cd9a23bde1b0029e6148af986
-
SHA1
4a080ad3b399024615f229357847e079c6597af8
-
SHA256
0710387a53ee2d45241f35f962168a5317469cd80244c85084f4bfe991495856
-
SHA512
0dc87a51682e4dbceff5006574bab8c75eebd818af7c3599ef628717af7d02cbcd6b82268f15694544fa4725d54a25e5ce952867b292c62d5b2e2030838fa5ee
-
SSDEEP
3072:F0cdgtALiLfa9o1mytjPGttGYmFbJ5Cc9bBBe9:KOgtBt1h+ttGYWfbu9
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe" 28028a7cd9a23bde1b0029e6148af986.exe -
Executes dropped EXE 1 IoCs
pid Process 2784 rui.exe -
resource yara_rule behavioral2/memory/2784-17-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "C:\\Users\\Admin\\rui.exe \\u" 28028a7cd9a23bde1b0029e6148af986.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\userdiff.sav 28028a7cd9a23bde1b0029e6148af986.exe File created C:\Windows\SysWOW64\userdiff.sav 28028a7cd9a23bde1b0029e6148af986.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1888 set thread context of 1264 1888 28028a7cd9a23bde1b0029e6148af986.exe 20 -
Program crash 2 IoCs
pid pid_target Process 1840 1264 WerFault.exe 3952 1708 WerFault.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1888 wrote to memory of 1264 1888 28028a7cd9a23bde1b0029e6148af986.exe 20 PID 1888 wrote to memory of 1264 1888 28028a7cd9a23bde1b0029e6148af986.exe 20 PID 1888 wrote to memory of 1264 1888 28028a7cd9a23bde1b0029e6148af986.exe 20 PID 1888 wrote to memory of 1264 1888 28028a7cd9a23bde1b0029e6148af986.exe 20 PID 1888 wrote to memory of 1264 1888 28028a7cd9a23bde1b0029e6148af986.exe 20 PID 1888 wrote to memory of 1264 1888 28028a7cd9a23bde1b0029e6148af986.exe 20 PID 1888 wrote to memory of 1264 1888 28028a7cd9a23bde1b0029e6148af986.exe 20 PID 1264 wrote to memory of 2784 1264 28028a7cd9a23bde1b0029e6148af986.exe 31 PID 1264 wrote to memory of 2784 1264 28028a7cd9a23bde1b0029e6148af986.exe 31 PID 1264 wrote to memory of 2784 1264 28028a7cd9a23bde1b0029e6148af986.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\28028a7cd9a23bde1b0029e6148af986.exe"C:\Users\Admin\AppData\Local\Temp\28028a7cd9a23bde1b0029e6148af986.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\28028a7cd9a23bde1b0029e6148af986.exe"C:\Users\Admin\AppData\Local\Temp\28028a7cd9a23bde1b0029e6148af986.exe"2⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\rui.exe\u3⤵
- Executes dropped EXE
PID:2784 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵PID:1708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3552.bat" "3⤵PID:4828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1264 -ip 12641⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 1921⤵
- Program crash
PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 1921⤵
- Program crash
PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1708 -ip 17081⤵PID:2236