Analysis
-
max time kernel
215s -
max time network
256s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:57
Static task
static1
Behavioral task
behavioral1
Sample
38e11adbc07bd32bf5159bdac1f4788e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38e11adbc07bd32bf5159bdac1f4788e.exe
Resource
win10v2004-20231215-en
General
-
Target
38e11adbc07bd32bf5159bdac1f4788e.exe
-
Size
264KB
-
MD5
38e11adbc07bd32bf5159bdac1f4788e
-
SHA1
650a205cf54b64d9bc5bcddf65595dd0c18d76cf
-
SHA256
1c58a3e251141732bc27e6f058625ff14c46b79af02f907f535ce3200d241a75
-
SHA512
7ab6e7dca0ed92ef6349fd8bd713cd09c57bc9227e847b974e6674838ff9423a27e42029a89529c079c7f19f448aaec227bdebee76d9945d09077c0e7d9bdbc7
-
SSDEEP
6144:dIlUbo4dxbVMGA1nOS/j07lKLiAeBRuRMMDngtinmv7LoIl:dGULxBy1OS7u4eAeBRkMMctxzp
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2028 ulun.exe 1008 ulun.exe -
Loads dropped DLL 3 IoCs
pid Process 2968 38e11adbc07bd32bf5159bdac1f4788e.exe 2968 38e11adbc07bd32bf5159bdac1f4788e.exe 2028 ulun.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C5EC6B71-B0B4-4258-A347-835F550FC76D} = "C:\\Users\\Admin\\AppData\\Roaming\\Fake\\ulun.exe" ulun.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2528 set thread context of 2968 2528 38e11adbc07bd32bf5159bdac1f4788e.exe 29 PID 2028 set thread context of 1008 2028 ulun.exe 31 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe 1008 ulun.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2968 38e11adbc07bd32bf5159bdac1f4788e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2968 2528 38e11adbc07bd32bf5159bdac1f4788e.exe 29 PID 2528 wrote to memory of 2968 2528 38e11adbc07bd32bf5159bdac1f4788e.exe 29 PID 2528 wrote to memory of 2968 2528 38e11adbc07bd32bf5159bdac1f4788e.exe 29 PID 2528 wrote to memory of 2968 2528 38e11adbc07bd32bf5159bdac1f4788e.exe 29 PID 2528 wrote to memory of 2968 2528 38e11adbc07bd32bf5159bdac1f4788e.exe 29 PID 2528 wrote to memory of 2968 2528 38e11adbc07bd32bf5159bdac1f4788e.exe 29 PID 2528 wrote to memory of 2968 2528 38e11adbc07bd32bf5159bdac1f4788e.exe 29 PID 2528 wrote to memory of 2968 2528 38e11adbc07bd32bf5159bdac1f4788e.exe 29 PID 2528 wrote to memory of 2968 2528 38e11adbc07bd32bf5159bdac1f4788e.exe 29 PID 2968 wrote to memory of 2028 2968 38e11adbc07bd32bf5159bdac1f4788e.exe 30 PID 2968 wrote to memory of 2028 2968 38e11adbc07bd32bf5159bdac1f4788e.exe 30 PID 2968 wrote to memory of 2028 2968 38e11adbc07bd32bf5159bdac1f4788e.exe 30 PID 2968 wrote to memory of 2028 2968 38e11adbc07bd32bf5159bdac1f4788e.exe 30 PID 2028 wrote to memory of 1008 2028 ulun.exe 31 PID 2028 wrote to memory of 1008 2028 ulun.exe 31 PID 2028 wrote to memory of 1008 2028 ulun.exe 31 PID 2028 wrote to memory of 1008 2028 ulun.exe 31 PID 2028 wrote to memory of 1008 2028 ulun.exe 31 PID 2028 wrote to memory of 1008 2028 ulun.exe 31 PID 2028 wrote to memory of 1008 2028 ulun.exe 31 PID 2028 wrote to memory of 1008 2028 ulun.exe 31 PID 2028 wrote to memory of 1008 2028 ulun.exe 31 PID 1008 wrote to memory of 1116 1008 ulun.exe 14 PID 1008 wrote to memory of 1116 1008 ulun.exe 14 PID 1008 wrote to memory of 1116 1008 ulun.exe 14 PID 1008 wrote to memory of 1116 1008 ulun.exe 14 PID 1008 wrote to memory of 1116 1008 ulun.exe 14 PID 1008 wrote to memory of 1180 1008 ulun.exe 6 PID 1008 wrote to memory of 1180 1008 ulun.exe 6 PID 1008 wrote to memory of 1180 1008 ulun.exe 6 PID 1008 wrote to memory of 1180 1008 ulun.exe 6 PID 1008 wrote to memory of 1180 1008 ulun.exe 6 PID 1008 wrote to memory of 1208 1008 ulun.exe 13 PID 1008 wrote to memory of 1208 1008 ulun.exe 13 PID 1008 wrote to memory of 1208 1008 ulun.exe 13 PID 1008 wrote to memory of 1208 1008 ulun.exe 13 PID 1008 wrote to memory of 1208 1008 ulun.exe 13 PID 1008 wrote to memory of 2968 1008 ulun.exe 29 PID 1008 wrote to memory of 2968 1008 ulun.exe 29 PID 1008 wrote to memory of 2968 1008 ulun.exe 29 PID 1008 wrote to memory of 2968 1008 ulun.exe 29 PID 1008 wrote to memory of 2968 1008 ulun.exe 29 PID 1008 wrote to memory of 488 1008 ulun.exe 32 PID 1008 wrote to memory of 488 1008 ulun.exe 32 PID 1008 wrote to memory of 488 1008 ulun.exe 32 PID 1008 wrote to memory of 488 1008 ulun.exe 32 PID 1008 wrote to memory of 488 1008 ulun.exe 32 PID 1008 wrote to memory of 3020 1008 ulun.exe 33 PID 1008 wrote to memory of 3020 1008 ulun.exe 33 PID 1008 wrote to memory of 3020 1008 ulun.exe 33 PID 1008 wrote to memory of 3020 1008 ulun.exe 33 PID 1008 wrote to memory of 3020 1008 ulun.exe 33 PID 1008 wrote to memory of 1496 1008 ulun.exe 34 PID 1008 wrote to memory of 1496 1008 ulun.exe 34 PID 1008 wrote to memory of 1496 1008 ulun.exe 34 PID 1008 wrote to memory of 1496 1008 ulun.exe 34 PID 1008 wrote to memory of 1496 1008 ulun.exe 34 PID 1008 wrote to memory of 1644 1008 ulun.exe 35 PID 1008 wrote to memory of 1644 1008 ulun.exe 35 PID 1008 wrote to memory of 1644 1008 ulun.exe 35 PID 1008 wrote to memory of 1644 1008 ulun.exe 35 PID 1008 wrote to memory of 1644 1008 ulun.exe 35 PID 1008 wrote to memory of 2840 1008 ulun.exe 36 PID 1008 wrote to memory of 2840 1008 ulun.exe 36
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\38e11adbc07bd32bf5159bdac1f4788e.exe"C:\Users\Admin\AppData\Local\Temp\38e11adbc07bd32bf5159bdac1f4788e.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\38e11adbc07bd32bf5159bdac1f4788e.exe"C:\Users\Admin\AppData\Local\Temp\38e11adbc07bd32bf5159bdac1f4788e.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Roaming\Fake\ulun.exe"C:\Users\Admin\AppData\Roaming\Fake\ulun.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\Fake\ulun.exe"C:\Users\Admin\AppData\Roaming\Fake\ulun.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1008
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd8070f2c.bat"4⤵PID:488
-
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3020
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1496
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1644
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD559c61493375834297233f949a9ae5f3c
SHA10ef7855488a2b0ea09ed8b55bff2847bd68e210a
SHA256a0ce426411a8b0b124fed0b142ef052a958bbe73288c55a2c96fa8f9f3efcdd3
SHA512e66f30150bf6c2b32be463e31a81a18e23db15dd3d52ba812594cd82c1df623e1b28649722a846eb01d6d38c6e6aa7a71c565388e54a107fafef02a84749f1e4