Analysis
-
max time kernel
92s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
8ffe79d7e86da8dd2fd5908053b2d1ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ffe79d7e86da8dd2fd5908053b2d1ff.exe
Resource
win10v2004-20231222-en
General
-
Target
8ffe79d7e86da8dd2fd5908053b2d1ff.exe
-
Size
79KB
-
MD5
8ffe79d7e86da8dd2fd5908053b2d1ff
-
SHA1
78131aa57241addb844a6d89940c66047c32eacb
-
SHA256
c4785ef64991e8e55d395a4ccdab39e87e69243228398db99fd187f36a4f9f36
-
SHA512
00f3b8394d521ca4f4876a5960ab428c5ccce1b809676186189a4f9c1b50ac910b8bd908483db444359361252f094023e0b76d1bc702b162200b54c6b36963d6
-
SSDEEP
1536:+16bq+91nioxizwglsP5XZFzCDnhat2zWim4qaq9e4VjuM+qtZleL60eY0Z/N:Qx2Ri8g+P5Xi/wXhbILmY0Z/N
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3524 WMPLAYER.EXE 5028 uwuque.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8ffe79d7e86da8dd2fd5908053b2d1ff.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\uwuque.exe WMPLAYER.EXE File opened for modification C:\Windows\SysWOW64\uwuque.exe WMPLAYER.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5028 set thread context of 960 5028 uwuque.exe 91 -
Program crash 1 IoCs
pid pid_target Process procid_target 4912 960 WerFault.exe 91 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3524 WMPLAYER.EXE 3524 WMPLAYER.EXE 5028 uwuque.exe 5028 uwuque.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 960 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4808 wrote to memory of 3524 4808 8ffe79d7e86da8dd2fd5908053b2d1ff.exe 86 PID 4808 wrote to memory of 3524 4808 8ffe79d7e86da8dd2fd5908053b2d1ff.exe 86 PID 4808 wrote to memory of 3524 4808 8ffe79d7e86da8dd2fd5908053b2d1ff.exe 86 PID 5028 wrote to memory of 960 5028 uwuque.exe 91 PID 5028 wrote to memory of 960 5028 uwuque.exe 91 PID 5028 wrote to memory of 960 5028 uwuque.exe 91 PID 5028 wrote to memory of 960 5028 uwuque.exe 91 PID 5028 wrote to memory of 960 5028 uwuque.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ffe79d7e86da8dd2fd5908053b2d1ff.exe"C:\Users\Admin\AppData\Local\Temp\8ffe79d7e86da8dd2fd5908053b2d1ff.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WMPLAYER.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WMPLAYER.EXE2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3524
-
-
C:\Windows\SysWOW64\uwuque.exeC:\Windows\SysWOW64\uwuque.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Suspicious use of UnmapMainImage
PID:960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 960 -s 123⤵
- Program crash
PID:4912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 960 -ip 9601⤵PID:1648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5f0503e64ac67f42db43a8abd8d7866e6
SHA18d0a84143d423abbdb1be9d389184857bec59e6e
SHA256926fa386ec1e11323595d93e64e1d8831dbcaafe5ac942d04754ebfaf3ecdad7
SHA51246506b3b4aef7fdf71ec6580362da39e26a22543f96b83baeefa59e361f10065e096a62aec79e87285882fe6b765723505d51125b9408834a53362be97570e97