Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
ae1724e6fcbfef51bf991d883c77c3a1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae1724e6fcbfef51bf991d883c77c3a1.exe
Resource
win10v2004-20240226-en
General
-
Target
ae1724e6fcbfef51bf991d883c77c3a1.exe
-
Size
434KB
-
MD5
ae1724e6fcbfef51bf991d883c77c3a1
-
SHA1
0c043e93bed4a263a2c0ca479d7d3945b7a4cc3e
-
SHA256
c2cca59e18aaa63920010efd55cc5513feb2058e35402c9842da000efde57a0d
-
SHA512
039cf08ebaa3e66a90c47875cef803842d07d5e36a1e87ee9c9492f637a8fad8e4f0f19f2faf3c95fb376e4659a8b4535a4d084b6ef20e98ee84e78381f6f97d
-
SSDEEP
12288:7GhTmO6ecJSn8zId5oSLtKHt16wOAJFkya3S:7GhaxZJ+8sLtKN1bDJFkym
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 772 uTYNEsbrvPE.exe -
Loads dropped DLL 2 IoCs
pid Process 2856 ae1724e6fcbfef51bf991d883c77c3a1.exe 2856 ae1724e6fcbfef51bf991d883c77c3a1.exe -
resource yara_rule behavioral1/memory/2856-1-0x0000000000600000-0x0000000000674000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\uTYNEsbrvPE = "C:\\ProgramData\\uTYNEsbrvPE.exe" ae1724e6fcbfef51bf991d883c77c3a1.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ae1724e6fcbfef51bf991d883c77c3a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum uTYNEsbrvPE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 uTYNEsbrvPE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ae1724e6fcbfef51bf991d883c77c3a1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Download ae1724e6fcbfef51bf991d883c77c3a1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" ae1724e6fcbfef51bf991d883c77c3a1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2856 ae1724e6fcbfef51bf991d883c77c3a1.exe 2856 ae1724e6fcbfef51bf991d883c77c3a1.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe 772 uTYNEsbrvPE.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2856 ae1724e6fcbfef51bf991d883c77c3a1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 772 2856 ae1724e6fcbfef51bf991d883c77c3a1.exe 28 PID 2856 wrote to memory of 772 2856 ae1724e6fcbfef51bf991d883c77c3a1.exe 28 PID 2856 wrote to memory of 772 2856 ae1724e6fcbfef51bf991d883c77c3a1.exe 28 PID 2856 wrote to memory of 772 2856 ae1724e6fcbfef51bf991d883c77c3a1.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ae1724e6fcbfef51bf991d883c77c3a1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" ae1724e6fcbfef51bf991d883c77c3a1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae1724e6fcbfef51bf991d883c77c3a1.exe"C:\Users\Admin\AppData\Local\Temp\ae1724e6fcbfef51bf991d883c77c3a1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2856 -
C:\ProgramData\uTYNEsbrvPE.exe"C:\ProgramData\uTYNEsbrvPE.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
434KB
MD5ae1724e6fcbfef51bf991d883c77c3a1
SHA10c043e93bed4a263a2c0ca479d7d3945b7a4cc3e
SHA256c2cca59e18aaa63920010efd55cc5513feb2058e35402c9842da000efde57a0d
SHA512039cf08ebaa3e66a90c47875cef803842d07d5e36a1e87ee9c9492f637a8fad8e4f0f19f2faf3c95fb376e4659a8b4535a4d084b6ef20e98ee84e78381f6f97d