Analysis

  • max time kernel
    90s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-02-2024 07:51

General

  • Target

    98e0505ee71259272c365fb13d223ff4.exe

  • Size

    14KB

  • MD5

    98e0505ee71259272c365fb13d223ff4

  • SHA1

    1a66aaadd74fcd5ec1280a2330c26e4dacec89e4

  • SHA256

    bb82b7c39db66cc9b25fc36a752d183cb7becb460ec8fdccc954a639b987f68a

  • SHA512

    5e3123b6adfcbe65918acf6cbf492e532b45376d93ef8aedcc45417296e04024a20409b909807d0c3727ebb7444871be9468f0e6078883acd9f610106afc89ee

  • SSDEEP

    192:UKolLDIGpeXSjvnS8KcTmhiXsN9R+aVexqpvoGTUISWIOoMjqujMzk7NOpE/tw:U3VZgXSjvS8FTbsNySV9zTBroe2k5Jt

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98e0505ee71259272c365fb13d223ff4.exe
    "C:\Users\Admin\AppData\Local\Temp\98e0505ee71259272c365fb13d223ff4.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3676
    • C:\Windows\SysWOW64\unldrexe.exe
      C:\Windows\system32\unldrexe.exe 5EA1355FD8066C91 c:\users\admin\appdata\local\temp\98e0505ee71259272c365fb13d223ff4.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Unldrexe

    Filesize

    12B

    MD5

    b94054d76296c59a92181d337e02e30f

    SHA1

    2914223734c457407352effe75bed56e4173ea7d

    SHA256

    feac117677b2853da3f1b338aba99e3465f2e52a40256bf8ff6418a46cdfaff4

    SHA512

    fd8b314d3b312d4cd2d5f992617d7a573bea63e178bac56ff7bac71aaae1cbdc9e5becc5929c4e3a253dd38ecafe91fb043df8eca94c5550a64f5e5b9dd631b5

  • C:\Windows\SysWOW64\unldrexe.exe

    Filesize

    14KB

    MD5

    98e0505ee71259272c365fb13d223ff4

    SHA1

    1a66aaadd74fcd5ec1280a2330c26e4dacec89e4

    SHA256

    bb82b7c39db66cc9b25fc36a752d183cb7becb460ec8fdccc954a639b987f68a

    SHA512

    5e3123b6adfcbe65918acf6cbf492e532b45376d93ef8aedcc45417296e04024a20409b909807d0c3727ebb7444871be9468f0e6078883acd9f610106afc89ee

  • memory/2044-10-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2044-12-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2044-14-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/3676-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3676-1-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/3676-11-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB