Analysis
-
max time kernel
32s -
max time network
23s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
28-02-2024 17:00
Static task
static1
Behavioral task
behavioral1
Sample
UHXZPYT78RVU5W5J5B5MHUGTB3GE.exe
Resource
win10-20240221-en
General
-
Target
UHXZPYT78RVU5W5J5B5MHUGTB3GE.exe
-
Size
282KB
-
MD5
e86471da9e0244d1d5e29b15fc9feb80
-
SHA1
5e237538eb5b5d4464751a4391302b4158e80f38
-
SHA256
50dd267b25062a6c94de3976d9a198a882a2b5801270492d32f0c0dadc6caa81
-
SHA512
d50a934923ec9133e871d797a59334ad92e0e51bcd3e3fd47f2c00510b87e69d6ac012682ac661121f6bbd0ece47872d79e4f9eae5550aae6dda3dd36bdb2088
-
SSDEEP
6144:Q/oAW1Fn0OjeJQ5oj4IaobX4+sDug70sc09RZF5zN4xpS:Q/oAW1FnuJFBaobX4TD4sc0zZuxpS
Malware Config
Signatures
-
Drops startup file 2 IoCs
Processes:
UHXZPYT78RVU5W5J5B5MHUGTB3GE.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UHXZPYT78RVU5W5J5B5MHUGTB3GE.exe UHXZPYT78RVU5W5J5B5MHUGTB3GE.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UHXZPYT78RVU5W5J5B5MHUGTB3GE.exe UHXZPYT78RVU5W5J5B5MHUGTB3GE.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
UHXZPYT78RVU5W5J5B5MHUGTB3GE.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1681664450-2645008397-319333953-1000\Software\Microsoft\Windows\CurrentVersion\Run\UHXZPYT78RVU5W5J5B5MHUGTB3GE.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\UHXZPYT78RVU5W5J5B5MHUGTB3GE.exe" UHXZPYT78RVU5W5J5B5MHUGTB3GE.exe -
Drops file in Windows directory 2 IoCs
Processes:
taskmgr.exedescription ioc process File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
taskmgr.exepid process 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 4176 taskmgr.exe Token: SeSystemProfilePrivilege 4176 taskmgr.exe Token: SeCreateGlobalPrivilege 4176 taskmgr.exe Token: 33 4176 taskmgr.exe Token: SeIncBasePriorityPrivilege 4176 taskmgr.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
Processes:
taskmgr.exepid process 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe -
Suspicious use of SendNotifyMessage 43 IoCs
Processes:
taskmgr.exepid process 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UHXZPYT78RVU5W5J5B5MHUGTB3GE.exe"C:\Users\Admin\AppData\Local\Temp\UHXZPYT78RVU5W5J5B5MHUGTB3GE.exe"1⤵
- Drops startup file
- Adds Run key to start application
PID:4320
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UHXZPYT78RVU5W5J5B5MHUGTB3GE.exe
Filesize282KB
MD5e86471da9e0244d1d5e29b15fc9feb80
SHA15e237538eb5b5d4464751a4391302b4158e80f38
SHA25650dd267b25062a6c94de3976d9a198a882a2b5801270492d32f0c0dadc6caa81
SHA512d50a934923ec9133e871d797a59334ad92e0e51bcd3e3fd47f2c00510b87e69d6ac012682ac661121f6bbd0ece47872d79e4f9eae5550aae6dda3dd36bdb2088