Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 20:57
Static task
static1
Behavioral task
behavioral1
Sample
7580de5edbe07ae539d7021b092d2b29.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7580de5edbe07ae539d7021b092d2b29.exe
Resource
win10v2004-20231215-en
General
-
Target
7580de5edbe07ae539d7021b092d2b29.exe
-
Size
262KB
-
MD5
7580de5edbe07ae539d7021b092d2b29
-
SHA1
d3839b47e35cc6c14872b164d71d137ef9211f70
-
SHA256
589102099622ea5e39289aee3819242650a5b5f418eb6827c4c60201a09161e2
-
SHA512
1b1555631e3f9510d0d1fdf2cabeee33b5408ee738358c3f2bceafd4c02b201d8ac00f21004eab8d56cc39ed4c9be7984e68df66187810dca6382fee8011f15e
-
SSDEEP
6144:HU8Gp+df0afmVTRMdOdpn94sLrNXel9jb98+MAkC:08YkfXf4TRMS94svNuzjb9ZD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1648 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2108 ukume.exe -
Loads dropped DLL 1 IoCs
pid Process 2236 7580de5edbe07ae539d7021b092d2b29.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\{99FD42C8-CEFB-AD4E-9644-6D1A8CD24E07} = "C:\\Users\\Admin\\AppData\\Roaming\\Aragw\\ukume.exe" ukume.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2236 set thread context of 1648 2236 7580de5edbe07ae539d7021b092d2b29.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Privacy 7580de5edbe07ae539d7021b092d2b29.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 7580de5edbe07ae539d7021b092d2b29.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe 2108 ukume.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2236 7580de5edbe07ae539d7021b092d2b29.exe Token: SeSecurityPrivilege 2236 7580de5edbe07ae539d7021b092d2b29.exe Token: SeSecurityPrivilege 2236 7580de5edbe07ae539d7021b092d2b29.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2236 7580de5edbe07ae539d7021b092d2b29.exe 2108 ukume.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2108 2236 7580de5edbe07ae539d7021b092d2b29.exe 28 PID 2236 wrote to memory of 2108 2236 7580de5edbe07ae539d7021b092d2b29.exe 28 PID 2236 wrote to memory of 2108 2236 7580de5edbe07ae539d7021b092d2b29.exe 28 PID 2236 wrote to memory of 2108 2236 7580de5edbe07ae539d7021b092d2b29.exe 28 PID 2108 wrote to memory of 1112 2108 ukume.exe 18 PID 2108 wrote to memory of 1112 2108 ukume.exe 18 PID 2108 wrote to memory of 1112 2108 ukume.exe 18 PID 2108 wrote to memory of 1112 2108 ukume.exe 18 PID 2108 wrote to memory of 1112 2108 ukume.exe 18 PID 2108 wrote to memory of 1172 2108 ukume.exe 17 PID 2108 wrote to memory of 1172 2108 ukume.exe 17 PID 2108 wrote to memory of 1172 2108 ukume.exe 17 PID 2108 wrote to memory of 1172 2108 ukume.exe 17 PID 2108 wrote to memory of 1172 2108 ukume.exe 17 PID 2108 wrote to memory of 1244 2108 ukume.exe 16 PID 2108 wrote to memory of 1244 2108 ukume.exe 16 PID 2108 wrote to memory of 1244 2108 ukume.exe 16 PID 2108 wrote to memory of 1244 2108 ukume.exe 16 PID 2108 wrote to memory of 1244 2108 ukume.exe 16 PID 2108 wrote to memory of 1936 2108 ukume.exe 15 PID 2108 wrote to memory of 1936 2108 ukume.exe 15 PID 2108 wrote to memory of 1936 2108 ukume.exe 15 PID 2108 wrote to memory of 1936 2108 ukume.exe 15 PID 2108 wrote to memory of 1936 2108 ukume.exe 15 PID 2108 wrote to memory of 2236 2108 ukume.exe 24 PID 2108 wrote to memory of 2236 2108 ukume.exe 24 PID 2108 wrote to memory of 2236 2108 ukume.exe 24 PID 2108 wrote to memory of 2236 2108 ukume.exe 24 PID 2108 wrote to memory of 2236 2108 ukume.exe 24 PID 2236 wrote to memory of 1648 2236 7580de5edbe07ae539d7021b092d2b29.exe 29 PID 2236 wrote to memory of 1648 2236 7580de5edbe07ae539d7021b092d2b29.exe 29 PID 2236 wrote to memory of 1648 2236 7580de5edbe07ae539d7021b092d2b29.exe 29 PID 2236 wrote to memory of 1648 2236 7580de5edbe07ae539d7021b092d2b29.exe 29 PID 2236 wrote to memory of 1648 2236 7580de5edbe07ae539d7021b092d2b29.exe 29 PID 2236 wrote to memory of 1648 2236 7580de5edbe07ae539d7021b092d2b29.exe 29 PID 2236 wrote to memory of 1648 2236 7580de5edbe07ae539d7021b092d2b29.exe 29 PID 2236 wrote to memory of 1648 2236 7580de5edbe07ae539d7021b092d2b29.exe 29 PID 2236 wrote to memory of 1648 2236 7580de5edbe07ae539d7021b092d2b29.exe 29
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1936
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\7580de5edbe07ae539d7021b092d2b29.exe"C:\Users\Admin\AppData\Local\Temp\7580de5edbe07ae539d7021b092d2b29.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Roaming\Aragw\ukume.exe"C:\Users\Admin\AppData\Roaming\Aragw\ukume.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp571f8200.bat"3⤵
- Deletes itself
PID:1648
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD5553b4b288ce96ac440804078c59680bb
SHA11775204078ccc7242eaf1a90d3e48e85fc8423f5
SHA256e34a32a180f56a7932d4d159b108ac668315d74300b42650a501a066f7c086ed
SHA512dda16b5bec746aefa5762fcbf5098fe2ee4fa2691041b00b5dfb0d1b4865ec5ca51eb5a26df2af5f5f0b90aaef79c4ed7179c5596ddd2a73a8280464b1daf1e4
-
Filesize
366B
MD538170b0bdcc8669d1c042c436c9b8502
SHA184ba1c6b0f204f46cff0f20691b8b4effc72d406
SHA256f55cdea5655ce7b23b29e21f09f66bff065ac3030838d4a18c4e21cf65ca8080
SHA512d8bb40b2f324dda2a43decbf4941c7a7a2bf3df1d6ff4ee1c71d2f47db44642cc95c4f917b4fbc950621882fd281a823be09e10fda6907fc5fb09f34040bf4c4
-
Filesize
262KB
MD5d03adc90d86fc610f3e7c4eb3598fe0d
SHA1df609c7fb9faa89c4b1e653c0ba455ae5835e53c
SHA25675b8d2bea0595ad1753e90ef23126f9960ece5d3eee4d56dadc5384d4e70d61d
SHA5127bc50e7b78a70ad3a59eca1362ab4ae0fddf27942df943026402360ea30f0ebb4ba350320b07f0e86bff9851cd42bd2d6c4eebf1661a73b1150ba1c21f7beac8