Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:37
Behavioral task
behavioral1
Sample
384c0265ed368f04971b9a3a14803520.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
384c0265ed368f04971b9a3a14803520.exe
Resource
win10v2004-20231215-en
General
-
Target
384c0265ed368f04971b9a3a14803520.exe
-
Size
185KB
-
MD5
384c0265ed368f04971b9a3a14803520
-
SHA1
55b39a8a89d06d36b455fbee7f82bf4b285a1f5f
-
SHA256
4e95ff295e8a272a4f3bd09548e8acb65e8c09d4dc30d676e7003b4a7c236b5c
-
SHA512
17c269b6bda09cf85b0862fcc3b2546e9d87caa81c4394381b8abbe14960247d5c111d45820f4319f7a683cc7b79ec1c1590827d88a66d5952ca23c014e152cb
-
SSDEEP
3072:/hV8Iw3MEAZyJwNRfqGxSQMs1Y/3uld0R6pD9xwHyu8cflYd3ra5Nna4RpL9lFHH:/hmIZyJwLfqGxe4W6+HyuflQGTpbFXiY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 808 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2452 urza.exe -
Loads dropped DLL 2 IoCs
pid Process 2672 384c0265ed368f04971b9a3a14803520.exe 2672 384c0265ed368f04971b9a3a14803520.exe -
resource yara_rule behavioral1/memory/2672-0-0x0000000000400000-0x000000000077B000-memory.dmp upx behavioral1/files/0x000c0000000155e6-11.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\{9DB029C8-CEC5-AD4E-0EA6-58580BF07B45} = "C:\\Users\\Admin\\AppData\\Roaming\\Defeji\\urza.exe" urza.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 808 2672 384c0265ed368f04971b9a3a14803520.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Privacy 384c0265ed368f04971b9a3a14803520.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 384c0265ed368f04971b9a3a14803520.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe 2452 urza.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2672 384c0265ed368f04971b9a3a14803520.exe Token: SeSecurityPrivilege 2672 384c0265ed368f04971b9a3a14803520.exe Token: SeSecurityPrivilege 2672 384c0265ed368f04971b9a3a14803520.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2452 2672 384c0265ed368f04971b9a3a14803520.exe 28 PID 2672 wrote to memory of 2452 2672 384c0265ed368f04971b9a3a14803520.exe 28 PID 2672 wrote to memory of 2452 2672 384c0265ed368f04971b9a3a14803520.exe 28 PID 2672 wrote to memory of 2452 2672 384c0265ed368f04971b9a3a14803520.exe 28 PID 2452 wrote to memory of 1116 2452 urza.exe 13 PID 2452 wrote to memory of 1116 2452 urza.exe 13 PID 2452 wrote to memory of 1116 2452 urza.exe 13 PID 2452 wrote to memory of 1116 2452 urza.exe 13 PID 2452 wrote to memory of 1116 2452 urza.exe 13 PID 2452 wrote to memory of 1176 2452 urza.exe 21 PID 2452 wrote to memory of 1176 2452 urza.exe 21 PID 2452 wrote to memory of 1176 2452 urza.exe 21 PID 2452 wrote to memory of 1176 2452 urza.exe 21 PID 2452 wrote to memory of 1176 2452 urza.exe 21 PID 2452 wrote to memory of 1208 2452 urza.exe 20 PID 2452 wrote to memory of 1208 2452 urza.exe 20 PID 2452 wrote to memory of 1208 2452 urza.exe 20 PID 2452 wrote to memory of 1208 2452 urza.exe 20 PID 2452 wrote to memory of 1208 2452 urza.exe 20 PID 2452 wrote to memory of 2024 2452 urza.exe 18 PID 2452 wrote to memory of 2024 2452 urza.exe 18 PID 2452 wrote to memory of 2024 2452 urza.exe 18 PID 2452 wrote to memory of 2024 2452 urza.exe 18 PID 2452 wrote to memory of 2024 2452 urza.exe 18 PID 2452 wrote to memory of 2672 2452 urza.exe 15 PID 2452 wrote to memory of 2672 2452 urza.exe 15 PID 2452 wrote to memory of 2672 2452 urza.exe 15 PID 2452 wrote to memory of 2672 2452 urza.exe 15 PID 2452 wrote to memory of 2672 2452 urza.exe 15 PID 2672 wrote to memory of 808 2672 384c0265ed368f04971b9a3a14803520.exe 29 PID 2672 wrote to memory of 808 2672 384c0265ed368f04971b9a3a14803520.exe 29 PID 2672 wrote to memory of 808 2672 384c0265ed368f04971b9a3a14803520.exe 29 PID 2672 wrote to memory of 808 2672 384c0265ed368f04971b9a3a14803520.exe 29 PID 2672 wrote to memory of 808 2672 384c0265ed368f04971b9a3a14803520.exe 29 PID 2672 wrote to memory of 808 2672 384c0265ed368f04971b9a3a14803520.exe 29 PID 2672 wrote to memory of 808 2672 384c0265ed368f04971b9a3a14803520.exe 29 PID 2672 wrote to memory of 808 2672 384c0265ed368f04971b9a3a14803520.exe 29 PID 2672 wrote to memory of 808 2672 384c0265ed368f04971b9a3a14803520.exe 29 PID 2452 wrote to memory of 1516 2452 urza.exe 30 PID 2452 wrote to memory of 1516 2452 urza.exe 30 PID 2452 wrote to memory of 1516 2452 urza.exe 30 PID 2452 wrote to memory of 1516 2452 urza.exe 30 PID 2452 wrote to memory of 1516 2452 urza.exe 30
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\384c0265ed368f04971b9a3a14803520.exe"C:\Users\Admin\AppData\Local\Temp\384c0265ed368f04971b9a3a14803520.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Roaming\Defeji\urza.exe"C:\Users\Admin\AppData\Roaming\Defeji\urza.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2452
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7e1b0cfb.bat"2⤵
- Deletes itself
PID:808
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2024
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "550283052-369068928-275324354208175179-187293194-244253997109969445-998635849"1⤵PID:1516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD5e9a6079579290fd3eb397f86bf57d7e5
SHA106aca132f72af85b0c987811ce4bd149da2fb0eb
SHA256ac862a40ef0274a43b6606def305c3b0a1188bd31b8fe81e42cee13393a00039
SHA5121d89952309f4e752b43abd07ef1f288735fe871ebfb135f82b29cf46bd5a2f303f6fc50c0017a879026e913485385b0f46aa9f9d983585b8e89823afa69d4678
-
Filesize
185KB
MD5c6629487c165881e9547fcd3e7b4d83c
SHA1541fbfc726423aff03ecc2d701e56887b2c880ff
SHA256178624c28fe0d3e2bc5f7cd313e27a1768d097747bb6afe9e8dfcf946db5c721
SHA512322251de28d12d76a3335252aa8a4f83c86358a5079475597f038d08d03ddd34240f3bc89f8b4723ca2140308f0fd49034afd9120a2fc5e9010dc137f0febef8
-
Filesize
366B
MD5b6c4da75437e2038f4f676e4a1d86501
SHA1d137e200778604ca8c5bb141bf6d84038d2b11dd
SHA25678436b0410b0b06e5cd39d8f533a6ec9807ffeeaa22cb430f87caea6790ede67
SHA51233aa36b0edb80914de292242378eccb5826accff0297e35ab93906288c7c7feabadec6391cb06b00ed37498ab83949a0eed5a788b2e7821101232f72e4250c20