Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
8f4a8acb7eefb90c158677b89f72eb50.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f4a8acb7eefb90c158677b89f72eb50.exe
Resource
win10v2004-20231215-en
General
-
Target
8f4a8acb7eefb90c158677b89f72eb50.exe
-
Size
294KB
-
MD5
8f4a8acb7eefb90c158677b89f72eb50
-
SHA1
07ffd04d5d9c1c81aad6dba5a56fa9ae462b5259
-
SHA256
1ad5e24925441337fbfc3e2cd98c5db55ac59baaac4256b130d588b1917b0b1e
-
SHA512
da45ad905cf31cb2d0b76a82dbda8d510cf3a0e2d19022e0e7143ae744f45b0385cdce0263e9dcbf93acdf03546073812f1d1c6da344e2ba9b20327b2035c7c3
-
SSDEEP
6144:NiGtsLrbAlqNC+W+1PTG/qm/PgCnmUSFMhl4V+M/oI29lKO:gGtsLrkt+/1PTEn/iUSFM8V+rI2oO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1820 ybaguf.exe -
Loads dropped DLL 2 IoCs
pid Process 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 1344 8f4a8acb7eefb90c158677b89f72eb50.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\{AAF68148-CEF2-AD4E-650F-46A5505365B8} = "C:\\Users\\Admin\\AppData\\Roaming\\Uggu\\ybaguf.exe" ybaguf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1344 set thread context of 1980 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2896 1980 WerFault.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Privacy 8f4a8acb7eefb90c158677b89f72eb50.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 8f4a8acb7eefb90c158677b89f72eb50.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe 1820 ybaguf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 1820 ybaguf.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1820 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 28 PID 1344 wrote to memory of 1820 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 28 PID 1344 wrote to memory of 1820 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 28 PID 1344 wrote to memory of 1820 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 28 PID 1820 wrote to memory of 1112 1820 ybaguf.exe 13 PID 1820 wrote to memory of 1112 1820 ybaguf.exe 13 PID 1820 wrote to memory of 1112 1820 ybaguf.exe 13 PID 1820 wrote to memory of 1112 1820 ybaguf.exe 13 PID 1820 wrote to memory of 1112 1820 ybaguf.exe 13 PID 1820 wrote to memory of 1164 1820 ybaguf.exe 14 PID 1820 wrote to memory of 1164 1820 ybaguf.exe 14 PID 1820 wrote to memory of 1164 1820 ybaguf.exe 14 PID 1820 wrote to memory of 1164 1820 ybaguf.exe 14 PID 1820 wrote to memory of 1164 1820 ybaguf.exe 14 PID 1820 wrote to memory of 1224 1820 ybaguf.exe 17 PID 1820 wrote to memory of 1224 1820 ybaguf.exe 17 PID 1820 wrote to memory of 1224 1820 ybaguf.exe 17 PID 1820 wrote to memory of 1224 1820 ybaguf.exe 17 PID 1820 wrote to memory of 1224 1820 ybaguf.exe 17 PID 1820 wrote to memory of 2004 1820 ybaguf.exe 19 PID 1820 wrote to memory of 2004 1820 ybaguf.exe 19 PID 1820 wrote to memory of 2004 1820 ybaguf.exe 19 PID 1820 wrote to memory of 2004 1820 ybaguf.exe 19 PID 1820 wrote to memory of 2004 1820 ybaguf.exe 19 PID 1820 wrote to memory of 1344 1820 ybaguf.exe 27 PID 1820 wrote to memory of 1344 1820 ybaguf.exe 27 PID 1820 wrote to memory of 1344 1820 ybaguf.exe 27 PID 1820 wrote to memory of 1344 1820 ybaguf.exe 27 PID 1820 wrote to memory of 1344 1820 ybaguf.exe 27 PID 1344 wrote to memory of 1980 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 29 PID 1344 wrote to memory of 1980 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 29 PID 1344 wrote to memory of 1980 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 29 PID 1344 wrote to memory of 1980 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 29 PID 1344 wrote to memory of 1980 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 29 PID 1344 wrote to memory of 1980 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 29 PID 1344 wrote to memory of 1980 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 29 PID 1344 wrote to memory of 1980 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 29 PID 1344 wrote to memory of 1980 1344 8f4a8acb7eefb90c158677b89f72eb50.exe 29 PID 1980 wrote to memory of 2896 1980 cmd.exe 31 PID 1980 wrote to memory of 2896 1980 cmd.exe 31 PID 1980 wrote to memory of 2896 1980 cmd.exe 31 PID 1980 wrote to memory of 2896 1980 cmd.exe 31 PID 1820 wrote to memory of 868 1820 ybaguf.exe 30 PID 1820 wrote to memory of 868 1820 ybaguf.exe 30 PID 1820 wrote to memory of 868 1820 ybaguf.exe 30 PID 1820 wrote to memory of 868 1820 ybaguf.exe 30 PID 1820 wrote to memory of 868 1820 ybaguf.exe 30 PID 1820 wrote to memory of 2896 1820 ybaguf.exe 31 PID 1820 wrote to memory of 2896 1820 ybaguf.exe 31 PID 1820 wrote to memory of 2896 1820 ybaguf.exe 31 PID 1820 wrote to memory of 2896 1820 ybaguf.exe 31 PID 1820 wrote to memory of 2896 1820 ybaguf.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\8f4a8acb7eefb90c158677b89f72eb50.exe"C:\Users\Admin\AppData\Local\Temp\8f4a8acb7eefb90c158677b89f72eb50.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Roaming\Uggu\ybaguf.exe"C:\Users\Admin\AppData\Roaming\Uggu\ybaguf.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8382a500.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 1164⤵
- Program crash
PID:2896
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2004
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-100682134221394251901835388546-65081776813613227561093905680233684672-1879801528"1⤵PID:868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294KB
MD5b5a7d0a92aa47941b22c1b805d33b9e9
SHA1b72edb1c98653c8db8914911548381d76af6dd24
SHA256a8672985768971490f759f658eca24cbb8ec19ab4c4ec49787caab31a128cda3
SHA51271ac93915a809f1d1c5eacf40039bf685c404140ff45998530a98dee5137d1a952ab8f38422e09980d484db77d8509c691bd1d2305367d8757ef7e831ad1f085