Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 07:51
Static task
static1
Behavioral task
behavioral1
Sample
98e0505ee71259272c365fb13d223ff4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98e0505ee71259272c365fb13d223ff4.exe
Resource
win10v2004-20231222-en
General
-
Target
98e0505ee71259272c365fb13d223ff4.exe
-
Size
14KB
-
MD5
98e0505ee71259272c365fb13d223ff4
-
SHA1
1a66aaadd74fcd5ec1280a2330c26e4dacec89e4
-
SHA256
bb82b7c39db66cc9b25fc36a752d183cb7becb460ec8fdccc954a639b987f68a
-
SHA512
5e3123b6adfcbe65918acf6cbf492e532b45376d93ef8aedcc45417296e04024a20409b909807d0c3727ebb7444871be9468f0e6078883acd9f610106afc89ee
-
SSDEEP
192:UKolLDIGpeXSjvnS8KcTmhiXsN9R+aVexqpvoGTUISWIOoMjqujMzk7NOpE/tw:U3VZgXSjvS8FTbsNySV9zTBroe2k5Jt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2044 unldrexe.exe -
Executes dropped EXE 1 IoCs
pid Process 2044 unldrexe.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Unldrexe = "c:\\windows\\syswow64\\unldrexe.exe" unldrexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Unldrexe = "c:\\windows\\syswow64\\unldrexe.exe" unldrexe.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\unldrexe.exe 98e0505ee71259272c365fb13d223ff4.exe File opened for modification C:\Windows\SysWOW64\unldrexe.exe 98e0505ee71259272c365fb13d223ff4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3676 wrote to memory of 2044 3676 98e0505ee71259272c365fb13d223ff4.exe 84 PID 3676 wrote to memory of 2044 3676 98e0505ee71259272c365fb13d223ff4.exe 84 PID 3676 wrote to memory of 2044 3676 98e0505ee71259272c365fb13d223ff4.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\98e0505ee71259272c365fb13d223ff4.exe"C:\Users\Admin\AppData\Local\Temp\98e0505ee71259272c365fb13d223ff4.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\unldrexe.exeC:\Windows\system32\unldrexe.exe 5EA1355FD8066C91 c:\users\admin\appdata\local\temp\98e0505ee71259272c365fb13d223ff4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD5b94054d76296c59a92181d337e02e30f
SHA12914223734c457407352effe75bed56e4173ea7d
SHA256feac117677b2853da3f1b338aba99e3465f2e52a40256bf8ff6418a46cdfaff4
SHA512fd8b314d3b312d4cd2d5f992617d7a573bea63e178bac56ff7bac71aaae1cbdc9e5becc5929c4e3a253dd38ecafe91fb043df8eca94c5550a64f5e5b9dd631b5
-
Filesize
14KB
MD598e0505ee71259272c365fb13d223ff4
SHA11a66aaadd74fcd5ec1280a2330c26e4dacec89e4
SHA256bb82b7c39db66cc9b25fc36a752d183cb7becb460ec8fdccc954a639b987f68a
SHA5125e3123b6adfcbe65918acf6cbf492e532b45376d93ef8aedcc45417296e04024a20409b909807d0c3727ebb7444871be9468f0e6078883acd9f610106afc89ee