Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 15:02
Behavioral task
behavioral1
Sample
bb8f368ef5df81e6cf643a0ad0b7d9b4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb8f368ef5df81e6cf643a0ad0b7d9b4.exe
Resource
win10v2004-20240226-en
General
-
Target
bb8f368ef5df81e6cf643a0ad0b7d9b4.exe
-
Size
19KB
-
MD5
bb8f368ef5df81e6cf643a0ad0b7d9b4
-
SHA1
a37c25efd2a4d1c5cbf180f8ed75ecdf430279e0
-
SHA256
3fd45dec7e9c7200012c0be611ad07c5c88c098f4ed2e76287d2a7b7f0593c32
-
SHA512
e32d42d17fd7297651f1dafe16b5e88168c28ecd9b7454e2ae60de9e5e24dbcf9ee89b6cb211788d9fbba3b8cd6dc6dd037cb51303f141440fdcc1c86c0aafaa
-
SSDEEP
384:ZKrhnnKfUrrs2AMj3KFKR3+TROswq7Op2Hhb0WSmAizv:ZKrkfcrs2r3K0eQYap2Bz1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4988 UpdaterUI.exe -
resource yara_rule behavioral2/memory/4996-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/files/0x000700000001e59e-4.dat upx behavioral2/memory/4988-6-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4996-7-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4988-8-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UpdaterUI = "C:\\Windows\\system32\\UpdaterUI.exe" bb8f368ef5df81e6cf643a0ad0b7d9b4.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\UpdaterUI.exe bb8f368ef5df81e6cf643a0ad0b7d9b4.exe File opened for modification C:\Windows\SysWOW64\UpdaterUI.exe bb8f368ef5df81e6cf643a0ad0b7d9b4.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4996 bb8f368ef5df81e6cf643a0ad0b7d9b4.exe 4996 bb8f368ef5df81e6cf643a0ad0b7d9b4.exe 4996 bb8f368ef5df81e6cf643a0ad0b7d9b4.exe 4996 bb8f368ef5df81e6cf643a0ad0b7d9b4.exe 4996 bb8f368ef5df81e6cf643a0ad0b7d9b4.exe 4996 bb8f368ef5df81e6cf643a0ad0b7d9b4.exe 4996 bb8f368ef5df81e6cf643a0ad0b7d9b4.exe 4996 bb8f368ef5df81e6cf643a0ad0b7d9b4.exe 4988 UpdaterUI.exe 4988 UpdaterUI.exe 4988 UpdaterUI.exe 4988 UpdaterUI.exe 4988 UpdaterUI.exe 4988 UpdaterUI.exe 4988 UpdaterUI.exe 4988 UpdaterUI.exe 4988 UpdaterUI.exe 4988 UpdaterUI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4996 wrote to memory of 4988 4996 bb8f368ef5df81e6cf643a0ad0b7d9b4.exe 88 PID 4996 wrote to memory of 4988 4996 bb8f368ef5df81e6cf643a0ad0b7d9b4.exe 88 PID 4996 wrote to memory of 4988 4996 bb8f368ef5df81e6cf643a0ad0b7d9b4.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb8f368ef5df81e6cf643a0ad0b7d9b4.exe"C:\Users\Admin\AppData\Local\Temp\bb8f368ef5df81e6cf643a0ad0b7d9b4.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\UpdaterUI.exeC:\Windows\system32\UpdaterUI.exe "C:\Users\Admin\AppData\Local\Temp\bb8f368ef5df81e6cf643a0ad0b7d9b4.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5bb8f368ef5df81e6cf643a0ad0b7d9b4
SHA1a37c25efd2a4d1c5cbf180f8ed75ecdf430279e0
SHA2563fd45dec7e9c7200012c0be611ad07c5c88c098f4ed2e76287d2a7b7f0593c32
SHA512e32d42d17fd7297651f1dafe16b5e88168c28ecd9b7454e2ae60de9e5e24dbcf9ee89b6cb211788d9fbba3b8cd6dc6dd037cb51303f141440fdcc1c86c0aafaa