Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    23/01/2024, 21:11

General

  • Target

    70916ef376c6a0cedb138d7cf5f87fd6.exe

  • Size

    63KB

  • MD5

    70916ef376c6a0cedb138d7cf5f87fd6

  • SHA1

    341e782f6cc3d019febae0d8c648e436f66cf90f

  • SHA256

    fb7ff1ce2078ec2ce00812533220dcc857717a90c92b8740659e7fe5718e7183

  • SHA512

    01fcba5cad0f1d089fa1ff1ddf9c5c76de8598252e1ceecbb70594a32d1ce3c95e28a53576dae527787a755ffe4351d847d7ad5c741e890c980b860885dc77b9

  • SSDEEP

    768:KgJayg6BQ99q25YNa0m3KnbopV6mx2GerrC3a9IY0/YUm5Q6ZOZV/vZXukZoMt2P:aqL+3KAxGmYj0AUmxUvuzWpCeozZ

Score
8/10

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70916ef376c6a0cedb138d7cf5f87fd6.exe
    "C:\Users\Admin\AppData\Local\Temp\70916ef376c6a0cedb138d7cf5f87fd6.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Loads dropped DLL
    • Drops file in System32 directory
    PID:1936
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k pbpiwk
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\uvbani.dll

    Filesize

    91KB

    MD5

    dfaa72d064527a6bb838bd12d058380c

    SHA1

    fe76a4d0a6961f04b3ad6c0bf089682ba0542ed6

    SHA256

    3366d4b28f6c65c97d47db75611bffea4c84e1dc21c793cdeddbc7c4e5e8e30a

    SHA512

    f15b1d93692331731e53d4e68449e668525caf6e53ed4cbd1284cbe50a99407029916f7067149e60312380d84303f8718fbacdcb8afcfb707080cac3b8ab2db2

  • memory/1936-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1936-5-0x0000000010000000-0x000000001001B000-memory.dmp

    Filesize

    108KB

  • memory/1936-8-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2284-9-0x0000000010000000-0x000000001001B000-memory.dmp

    Filesize

    108KB