Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 13:41

General

  • Target

    8f4a8acb7eefb90c158677b89f72eb50.exe

  • Size

    294KB

  • MD5

    8f4a8acb7eefb90c158677b89f72eb50

  • SHA1

    07ffd04d5d9c1c81aad6dba5a56fa9ae462b5259

  • SHA256

    1ad5e24925441337fbfc3e2cd98c5db55ac59baaac4256b130d588b1917b0b1e

  • SHA512

    da45ad905cf31cb2d0b76a82dbda8d510cf3a0e2d19022e0e7143ae744f45b0385cdce0263e9dcbf93acdf03546073812f1d1c6da344e2ba9b20327b2035c7c3

  • SSDEEP

    6144:NiGtsLrbAlqNC+W+1PTG/qm/PgCnmUSFMhl4V+M/oI29lKO:gGtsLrkt+/1PTEn/iUSFM8V+rI2oO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1112
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1164
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1224
          • C:\Users\Admin\AppData\Local\Temp\8f4a8acb7eefb90c158677b89f72eb50.exe
            "C:\Users\Admin\AppData\Local\Temp\8f4a8acb7eefb90c158677b89f72eb50.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:1344
            • C:\Users\Admin\AppData\Roaming\Uggu\ybaguf.exe
              "C:\Users\Admin\AppData\Roaming\Uggu\ybaguf.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:1820
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8382a500.bat"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1980
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 116
                4⤵
                • Program crash
                PID:2896
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:2004
          • C:\Windows\system32\conhost.exe
            \??\C:\Windows\system32\conhost.exe "-100682134221394251901835388546-65081776813613227561093905680233684672-1879801528"
            1⤵
              PID:868

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Uggu\ybaguf.exe

              Filesize

              294KB

              MD5

              b5a7d0a92aa47941b22c1b805d33b9e9

              SHA1

              b72edb1c98653c8db8914911548381d76af6dd24

              SHA256

              a8672985768971490f759f658eca24cbb8ec19ab4c4ec49787caab31a128cda3

              SHA512

              71ac93915a809f1d1c5eacf40039bf685c404140ff45998530a98dee5137d1a952ab8f38422e09980d484db77d8509c691bd1d2305367d8757ef7e831ad1f085

            • memory/1112-23-0x0000000001D30000-0x0000000001D74000-memory.dmp

              Filesize

              272KB

            • memory/1112-19-0x0000000001D30000-0x0000000001D74000-memory.dmp

              Filesize

              272KB

            • memory/1112-21-0x0000000001D30000-0x0000000001D74000-memory.dmp

              Filesize

              272KB

            • memory/1112-22-0x0000000001D30000-0x0000000001D74000-memory.dmp

              Filesize

              272KB

            • memory/1112-17-0x0000000001D30000-0x0000000001D74000-memory.dmp

              Filesize

              272KB

            • memory/1164-28-0x0000000001BF0000-0x0000000001C34000-memory.dmp

              Filesize

              272KB

            • memory/1164-27-0x0000000001BF0000-0x0000000001C34000-memory.dmp

              Filesize

              272KB

            • memory/1164-26-0x0000000001BF0000-0x0000000001C34000-memory.dmp

              Filesize

              272KB

            • memory/1164-25-0x0000000001BF0000-0x0000000001C34000-memory.dmp

              Filesize

              272KB

            • memory/1224-33-0x00000000029A0000-0x00000000029E4000-memory.dmp

              Filesize

              272KB

            • memory/1224-30-0x00000000029A0000-0x00000000029E4000-memory.dmp

              Filesize

              272KB

            • memory/1224-31-0x00000000029A0000-0x00000000029E4000-memory.dmp

              Filesize

              272KB

            • memory/1224-32-0x00000000029A0000-0x00000000029E4000-memory.dmp

              Filesize

              272KB

            • memory/1344-45-0x0000000001E80000-0x0000000001EC4000-memory.dmp

              Filesize

              272KB

            • memory/1344-56-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-5-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1344-4-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1344-2-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1344-163-0x0000000001E80000-0x0000000001EC4000-memory.dmp

              Filesize

              272KB

            • memory/1344-162-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1344-142-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-82-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-80-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-78-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-76-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-41-0x0000000001E80000-0x0000000001EC4000-memory.dmp

              Filesize

              272KB

            • memory/1344-42-0x0000000001E80000-0x0000000001EC4000-memory.dmp

              Filesize

              272KB

            • memory/1344-43-0x0000000001E80000-0x0000000001EC4000-memory.dmp

              Filesize

              272KB

            • memory/1344-44-0x0000000001E80000-0x0000000001EC4000-memory.dmp

              Filesize

              272KB

            • memory/1344-0-0x00000000004A0000-0x00000000004E4000-memory.dmp

              Filesize

              272KB

            • memory/1344-46-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-48-0x0000000001E80000-0x0000000001EC4000-memory.dmp

              Filesize

              272KB

            • memory/1344-50-0x00000000776A0000-0x00000000776A1000-memory.dmp

              Filesize

              4KB

            • memory/1344-49-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-52-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-54-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-1-0x00000000004F0000-0x000000000053D000-memory.dmp

              Filesize

              308KB

            • memory/1344-58-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-60-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-62-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-64-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-66-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-68-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-70-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-72-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1344-74-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/1820-20-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1820-277-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1820-15-0x0000000000320000-0x0000000000364000-memory.dmp

              Filesize

              272KB

            • memory/1820-18-0x0000000000370000-0x00000000003BD000-memory.dmp

              Filesize

              308KB

            • memory/2004-35-0x0000000001BA0000-0x0000000001BE4000-memory.dmp

              Filesize

              272KB

            • memory/2004-38-0x0000000001BA0000-0x0000000001BE4000-memory.dmp

              Filesize

              272KB

            • memory/2004-36-0x0000000001BA0000-0x0000000001BE4000-memory.dmp

              Filesize

              272KB

            • memory/2004-37-0x0000000001BA0000-0x0000000001BE4000-memory.dmp

              Filesize

              272KB

            • memory/2896-175-0x0000000001D70000-0x0000000001DB4000-memory.dmp

              Filesize

              272KB

            • memory/2896-178-0x00000000776A0000-0x00000000776A1000-memory.dmp

              Filesize

              4KB

            • memory/2896-180-0x00000000776A0000-0x00000000776A1000-memory.dmp

              Filesize

              4KB

            • memory/2896-250-0x00000000004F0000-0x00000000004F1000-memory.dmp

              Filesize

              4KB

            • memory/2896-278-0x00000000004F0000-0x00000000004F1000-memory.dmp

              Filesize

              4KB

            • memory/2896-280-0x0000000001D70000-0x0000000001DB4000-memory.dmp

              Filesize

              272KB