Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
5675812ab00decc7dd4ea27cd22cd98b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5675812ab00decc7dd4ea27cd22cd98b.exe
Resource
win10v2004-20231215-en
General
-
Target
5675812ab00decc7dd4ea27cd22cd98b.exe
-
Size
178KB
-
MD5
5675812ab00decc7dd4ea27cd22cd98b
-
SHA1
5fafd0f90e100d562321ddb51fcb21eb8adef576
-
SHA256
517cb827b4727f02182954f911afdc1941baca8ba811e8f9be52d5d1a044ac76
-
SHA512
468321768e0db7ab99e93b84216ab6b10850ce1bfa8adbc8c5168276ae6f480a5e602e435a8299028215c050a2308a187b5faa7f37c003f219ea6558f8438d01
-
SSDEEP
3072:vawFVZVyuiwiOas97N7I+WipOS85v6iu0G1dy+1ZVdAEdvttaxIEzSf9Nn+WuO6K:vawFVZ0xjc97N7IBiCB6Vhg+TVdAAjIG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2292 uqfilgw2.exe -
Loads dropped DLL 1 IoCs
pid Process 1732 5675812ab00decc7dd4ea27cd22cd98b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\uqfilgw2.exe = "C:\\Users\\Admin\\AppData\\Roaming\\uqfilgw2.exe" 5675812ab00decc7dd4ea27cd22cd98b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main uqfilgw2.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch uqfilgw2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" uqfilgw2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe 2292 uqfilgw2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2292 uqfilgw2.exe 2292 uqfilgw2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2292 1732 5675812ab00decc7dd4ea27cd22cd98b.exe 28 PID 1732 wrote to memory of 2292 1732 5675812ab00decc7dd4ea27cd22cd98b.exe 28 PID 1732 wrote to memory of 2292 1732 5675812ab00decc7dd4ea27cd22cd98b.exe 28 PID 1732 wrote to memory of 2292 1732 5675812ab00decc7dd4ea27cd22cd98b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5675812ab00decc7dd4ea27cd22cd98b.exe"C:\Users\Admin\AppData\Local\Temp\5675812ab00decc7dd4ea27cd22cd98b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Roaming\uqfilgw2.exe"C:\Users\Admin\AppData\Roaming\uqfilgw2.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\ib2[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
8B
MD5919c5723dcd1534398f52cf8c0ef599c
SHA115ed7ad6254c04080d750fb4d2cc310592c46e3c
SHA256ae2cdbad7847e8ca2b942cc7fa7366b619f593946f033645d7af64ffe2e866be
SHA5125b4cc4d4a5314c60561e79b373be60d70c8ad7e095da494507e0f2a70ca3817d9718293718eba5599a3573d316698bc8623e9556bc1c86f698a958f19e8cd962
-
Filesize
178KB
MD55675812ab00decc7dd4ea27cd22cd98b
SHA15fafd0f90e100d562321ddb51fcb21eb8adef576
SHA256517cb827b4727f02182954f911afdc1941baca8ba811e8f9be52d5d1a044ac76
SHA512468321768e0db7ab99e93b84216ab6b10850ce1bfa8adbc8c5168276ae6f480a5e602e435a8299028215c050a2308a187b5faa7f37c003f219ea6558f8438d01