Analysis
-
max time kernel
160s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
tuc4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
tuc4.exe
Resource
win10v2004-20231215-en
General
-
Target
tuc4.exe
-
Size
4.5MB
-
MD5
84beecea8a3b79b1a0993c5efe787ea8
-
SHA1
8f82b68359bc4e4e4a3d4f082d5d3825bebc1049
-
SHA256
daa74b36d89c37396f2df487ad202f513ea6779793e7a3fc6243d33d8f82fbea
-
SHA512
96da6b8e83610c976df3de06b683f82eea1dd7905cde2def92ef673c8edd05e49137de7f7cc75f59ba84bef31c879f8d3e5de67f40ec55f06cb7a64a5482e540
-
SSDEEP
98304:Q9rs7Swve6EwRuh50lRkmNOz7bbd+2OKbZ7+KSkmVFWajbdl4dm8:wo16wOqE7OiCKSFWajRl4dD
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2780 tuc4.tmp 4476 pip-master-std-lib.exe 2528 pip-master-std-lib.exe -
Loads dropped DLL 3 IoCs
pid Process 2780 tuc4.tmp 2780 tuc4.tmp 2780 tuc4.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2780 tuc4.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4544 wrote to memory of 2780 4544 tuc4.exe 96 PID 4544 wrote to memory of 2780 4544 tuc4.exe 96 PID 4544 wrote to memory of 2780 4544 tuc4.exe 96 PID 2780 wrote to memory of 2756 2780 tuc4.tmp 99 PID 2780 wrote to memory of 2756 2780 tuc4.tmp 99 PID 2780 wrote to memory of 2756 2780 tuc4.tmp 99 PID 2780 wrote to memory of 4476 2780 tuc4.tmp 101 PID 2780 wrote to memory of 4476 2780 tuc4.tmp 101 PID 2780 wrote to memory of 4476 2780 tuc4.tmp 101 PID 2756 wrote to memory of 4588 2756 net.exe 102 PID 2756 wrote to memory of 4588 2756 net.exe 102 PID 2756 wrote to memory of 4588 2756 net.exe 102 PID 2780 wrote to memory of 2528 2780 tuc4.tmp 103 PID 2780 wrote to memory of 2528 2780 tuc4.tmp 103 PID 2780 wrote to memory of 2528 2780 tuc4.tmp 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\tuc4.exe"C:\Users\Admin\AppData\Local\Temp\tuc4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\is-E76UR.tmp\tuc4.tmp"C:\Users\Admin\AppData\Local\Temp\is-E76UR.tmp\tuc4.tmp" /SL5="$6011A,4463955,54272,C:\Users\Admin\AppData\Local\Temp\tuc4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 1533⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 1534⤵PID:4588
-
-
-
C:\Users\Admin\AppData\Local\PIP Master std lib\pip-master-std-lib.exe"C:\Users\Admin\AppData\Local\PIP Master std lib\pip-master-std-lib.exe" -i3⤵
- Executes dropped EXE
PID:4476
-
-
C:\Users\Admin\AppData\Local\PIP Master std lib\pip-master-std-lib.exe"C:\Users\Admin\AppData\Local\PIP Master std lib\pip-master-std-lib.exe" -s3⤵
- Executes dropped EXE
PID:2528
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5b2f674e28e2f50ad732b01634260eb5f
SHA192a11ab5d536a3fe01a0cdf8b50ca044dcced05f
SHA256a14b9c633ce91f1a659757481b024b275a8ca0cc5eb59a7b24dc6453454061e4
SHA5129bf21365d88333993e86cb646c9160e1e38d1956b320966c93600395a233e2f8df85ae08dbee6f4c1246616778ee80621c8d154eeb00e2218e6014097eef2253
-
Filesize
1024KB
MD507c2626d79fb09833814f3e6afa3b695
SHA1094c79dc6129e4c0f786e484762499c5d3f19b02
SHA2564255c8d5020ee092d4ee10faebb4403323720586a0eae15f54ee3377ccaf2280
SHA512750d017efee8201521d154bbea8109a548d7d1b0b1ed3306f2c486353b6c7d2d12b60c950d99ba29de308e0b3aada40dfc7a030cc0ccc332e4a39f2df6343c04
-
Filesize
688KB
MD5a7662827ecaeb4fc68334f6b8791b917
SHA1f93151dd228d680aa2910280e51f0a84d0cad105
SHA25605f159722d6905719d2d6f340981a293f40ab8a0d2d4a282c948066809d4af6d
SHA512e9880b3f3ec9201e59114850e9c570d0ad6d3b0e04c60929a03cf983c62c505fcb6bb9dc3adeee88c78d43bd484159626b4a2f000a34b8883164c263f21e6f4a
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4