Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
70916ef376c6a0cedb138d7cf5f87fd6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
70916ef376c6a0cedb138d7cf5f87fd6.exe
Resource
win10v2004-20231215-en
General
-
Target
70916ef376c6a0cedb138d7cf5f87fd6.exe
-
Size
63KB
-
MD5
70916ef376c6a0cedb138d7cf5f87fd6
-
SHA1
341e782f6cc3d019febae0d8c648e436f66cf90f
-
SHA256
fb7ff1ce2078ec2ce00812533220dcc857717a90c92b8740659e7fe5718e7183
-
SHA512
01fcba5cad0f1d089fa1ff1ddf9c5c76de8598252e1ceecbb70594a32d1ce3c95e28a53576dae527787a755ffe4351d847d7ad5c741e890c980b860885dc77b9
-
SSDEEP
768:KgJayg6BQ99q25YNa0m3KnbopV6mx2GerrC3a9IY0/YUm5Q6ZOZV/vZXukZoMt2P:aqL+3KAxGmYj0AUmxUvuzWpCeozZ
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\pbpiwk\Parameters\ServiceDll = "%SystemRoot%\\System32\\uvbani.dll" 70916ef376c6a0cedb138d7cf5f87fd6.exe -
Deletes itself 1 IoCs
pid Process 2284 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1936 70916ef376c6a0cedb138d7cf5f87fd6.exe 2284 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\0005534a.001 70916ef376c6a0cedb138d7cf5f87fd6.exe File created C:\Windows\SysWOW64\uvbani.dll 70916ef376c6a0cedb138d7cf5f87fd6.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70916ef376c6a0cedb138d7cf5f87fd6.exe"C:\Users\Admin\AppData\Local\Temp\70916ef376c6a0cedb138d7cf5f87fd6.exe"1⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
PID:1936
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k pbpiwk1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5dfaa72d064527a6bb838bd12d058380c
SHA1fe76a4d0a6961f04b3ad6c0bf089682ba0542ed6
SHA2563366d4b28f6c65c97d47db75611bffea4c84e1dc21c793cdeddbc7c4e5e8e30a
SHA512f15b1d93692331731e53d4e68449e668525caf6e53ed4cbd1284cbe50a99407029916f7067149e60312380d84303f8718fbacdcb8afcfb707080cac3b8ab2db2