Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
a2bb1e5363683a0fe961f593dc487ff3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2bb1e5363683a0fe961f593dc487ff3.exe
Resource
win10v2004-20240221-en
General
-
Target
a2bb1e5363683a0fe961f593dc487ff3.exe
-
Size
360KB
-
MD5
a2bb1e5363683a0fe961f593dc487ff3
-
SHA1
e2000b4c5aee907ffc9996fca1f77ef544624ad8
-
SHA256
70ac910b42fb4942e1a2cf678b07b43fa54ad70ebd9d52aff2c3be1233db250f
-
SHA512
4b6a598ef7a9acaf02057e59222304e1272f32f3b31b80a3e3949bb902c48ccd6f8950c7d3ca5676b1bfa605974840193b3bdf700123a685b3337fe4a2da967d
-
SSDEEP
6144:RsQzH8sbE+kGSwyX3PnhLatV/sU01rkS6OFxKS:R/zc2E+kG8X/nGi4AF8S
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1576 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1788 uxevba.exe -
Loads dropped DLL 2 IoCs
pid Process 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 1196 a2bb1e5363683a0fe961f593dc487ff3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7770FDC8-846D-AD4E-26F1-2C003EAC0F1D} = "C:\\Users\\Admin\\AppData\\Roaming\\Iret\\uxevba.exe" uxevba.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1196 set thread context of 1576 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Privacy a2bb1e5363683a0fe961f593dc487ff3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" a2bb1e5363683a0fe961f593dc487ff3.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe 1788 uxevba.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 1788 uxevba.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1788 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 28 PID 1196 wrote to memory of 1788 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 28 PID 1196 wrote to memory of 1788 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 28 PID 1196 wrote to memory of 1788 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 28 PID 1788 wrote to memory of 1108 1788 uxevba.exe 9 PID 1788 wrote to memory of 1108 1788 uxevba.exe 9 PID 1788 wrote to memory of 1108 1788 uxevba.exe 9 PID 1788 wrote to memory of 1108 1788 uxevba.exe 9 PID 1788 wrote to memory of 1108 1788 uxevba.exe 9 PID 1788 wrote to memory of 1168 1788 uxevba.exe 16 PID 1788 wrote to memory of 1168 1788 uxevba.exe 16 PID 1788 wrote to memory of 1168 1788 uxevba.exe 16 PID 1788 wrote to memory of 1168 1788 uxevba.exe 16 PID 1788 wrote to memory of 1168 1788 uxevba.exe 16 PID 1788 wrote to memory of 1204 1788 uxevba.exe 15 PID 1788 wrote to memory of 1204 1788 uxevba.exe 15 PID 1788 wrote to memory of 1204 1788 uxevba.exe 15 PID 1788 wrote to memory of 1204 1788 uxevba.exe 15 PID 1788 wrote to memory of 1204 1788 uxevba.exe 15 PID 1788 wrote to memory of 2384 1788 uxevba.exe 13 PID 1788 wrote to memory of 2384 1788 uxevba.exe 13 PID 1788 wrote to memory of 2384 1788 uxevba.exe 13 PID 1788 wrote to memory of 2384 1788 uxevba.exe 13 PID 1788 wrote to memory of 2384 1788 uxevba.exe 13 PID 1788 wrote to memory of 1196 1788 uxevba.exe 27 PID 1788 wrote to memory of 1196 1788 uxevba.exe 27 PID 1788 wrote to memory of 1196 1788 uxevba.exe 27 PID 1788 wrote to memory of 1196 1788 uxevba.exe 27 PID 1788 wrote to memory of 1196 1788 uxevba.exe 27 PID 1196 wrote to memory of 1576 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 29 PID 1196 wrote to memory of 1576 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 29 PID 1196 wrote to memory of 1576 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 29 PID 1196 wrote to memory of 1576 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 29 PID 1196 wrote to memory of 1576 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 29 PID 1196 wrote to memory of 1576 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 29 PID 1196 wrote to memory of 1576 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 29 PID 1196 wrote to memory of 1576 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 29 PID 1196 wrote to memory of 1576 1196 a2bb1e5363683a0fe961f593dc487ff3.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2384
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\a2bb1e5363683a0fe961f593dc487ff3.exe"C:\Users\Admin\AppData\Local\Temp\a2bb1e5363683a0fe961f593dc487ff3.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Roaming\Iret\uxevba.exe"C:\Users\Admin\AppData\Roaming\Iret\uxevba.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1788
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp4f16a088.bat"3⤵
- Deletes itself
PID:1576
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD58e5c23f1a34102c50a96191b1b0bfe0b
SHA1e8b5b9c76f779400ec4ab2c03864bf870a875e99
SHA256cf6060e71941067ab65981f9b72f2766c9052f271fdfb2b86e18bad418e14547
SHA512937bb199ff5136938b9f3e3c37f3bb7a9ffd836f5704157943a4d0bbd4941b35378d53fc66dc26c94e58213ebdde335eb735bb783e206d3ee372a12897a2dce0
-
Filesize
360KB
MD5dfa5bb901133c5a839a36982b700d4e5
SHA11be19481b2b2b0dd6cae99dfaf8f0e5b5202c4ab
SHA256964c08064369ee63ef8298313ccde26e5c3c3f144bbab42e62e9ad7881a2c111
SHA51259fea5e3c87c67d2ef8e88a6772ffecd9608bcaddd87fa0bac93866ba48cbdc504a11490e3857220fbd5fd524fbdece07a900bd9e333bd82191083556a9687e0