Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe
Resource
win10v2004-20240226-en
General
-
Target
0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe
-
Size
388KB
-
MD5
884f23c133aabcab9cabb5c3dd3f2c24
-
SHA1
03b1bf9b1860bce33098cb8bfeca870ce84ae8f5
-
SHA256
0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708
-
SHA512
fdc724b68db8d1c3594e88ed187547ca9e4dd0ad44af4fa15e928088419782ca717fea05b905f6f927f81892e84c88eec98d2cc13111749a07f895171eeff6f8
-
SSDEEP
6144:HNAXIjJ+erLRzXQW/lU9dhG3vKDbgUlXLm0MmSpNyM:HNAIjJ++VDT/lkECf3XpXM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1808 ugulse.exe -
Loads dropped DLL 2 IoCs
pid Process 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\{2FF1FB48-8463-AD4E-783C-A76D5E948470} = "C:\\Users\\Admin\\AppData\\Roaming\\Ujso\\ugulse.exe" ugulse.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 808 set thread context of 1664 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 1120 1664 WerFault.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Privacy 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe 1808 ugulse.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 1808 ugulse.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 808 wrote to memory of 1808 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 28 PID 808 wrote to memory of 1808 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 28 PID 808 wrote to memory of 1808 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 28 PID 808 wrote to memory of 1808 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 28 PID 1808 wrote to memory of 1124 1808 ugulse.exe 19 PID 1808 wrote to memory of 1124 1808 ugulse.exe 19 PID 1808 wrote to memory of 1124 1808 ugulse.exe 19 PID 1808 wrote to memory of 1124 1808 ugulse.exe 19 PID 1808 wrote to memory of 1124 1808 ugulse.exe 19 PID 1808 wrote to memory of 1180 1808 ugulse.exe 20 PID 1808 wrote to memory of 1180 1808 ugulse.exe 20 PID 1808 wrote to memory of 1180 1808 ugulse.exe 20 PID 1808 wrote to memory of 1180 1808 ugulse.exe 20 PID 1808 wrote to memory of 1180 1808 ugulse.exe 20 PID 1808 wrote to memory of 1240 1808 ugulse.exe 21 PID 1808 wrote to memory of 1240 1808 ugulse.exe 21 PID 1808 wrote to memory of 1240 1808 ugulse.exe 21 PID 1808 wrote to memory of 1240 1808 ugulse.exe 21 PID 1808 wrote to memory of 1240 1808 ugulse.exe 21 PID 1808 wrote to memory of 1904 1808 ugulse.exe 23 PID 1808 wrote to memory of 1904 1808 ugulse.exe 23 PID 1808 wrote to memory of 1904 1808 ugulse.exe 23 PID 1808 wrote to memory of 1904 1808 ugulse.exe 23 PID 1808 wrote to memory of 1904 1808 ugulse.exe 23 PID 1808 wrote to memory of 808 1808 ugulse.exe 27 PID 1808 wrote to memory of 808 1808 ugulse.exe 27 PID 1808 wrote to memory of 808 1808 ugulse.exe 27 PID 1808 wrote to memory of 808 1808 ugulse.exe 27 PID 1808 wrote to memory of 808 1808 ugulse.exe 27 PID 808 wrote to memory of 1664 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 29 PID 808 wrote to memory of 1664 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 29 PID 808 wrote to memory of 1664 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 29 PID 808 wrote to memory of 1664 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 29 PID 808 wrote to memory of 1664 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 29 PID 808 wrote to memory of 1664 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 29 PID 808 wrote to memory of 1664 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 29 PID 808 wrote to memory of 1664 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 29 PID 808 wrote to memory of 1664 808 0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe 29 PID 1664 wrote to memory of 1120 1664 cmd.exe 31 PID 1664 wrote to memory of 1120 1664 cmd.exe 31 PID 1664 wrote to memory of 1120 1664 cmd.exe 31 PID 1664 wrote to memory of 1120 1664 cmd.exe 31 PID 1808 wrote to memory of 1488 1808 ugulse.exe 30 PID 1808 wrote to memory of 1488 1808 ugulse.exe 30 PID 1808 wrote to memory of 1488 1808 ugulse.exe 30 PID 1808 wrote to memory of 1488 1808 ugulse.exe 30 PID 1808 wrote to memory of 1488 1808 ugulse.exe 30 PID 1808 wrote to memory of 1120 1808 ugulse.exe 31 PID 1808 wrote to memory of 1120 1808 ugulse.exe 31 PID 1808 wrote to memory of 1120 1808 ugulse.exe 31 PID 1808 wrote to memory of 1120 1808 ugulse.exe 31 PID 1808 wrote to memory of 1120 1808 ugulse.exe 31 PID 1808 wrote to memory of 2412 1808 ugulse.exe 34 PID 1808 wrote to memory of 2412 1808 ugulse.exe 34 PID 1808 wrote to memory of 2412 1808 ugulse.exe 34 PID 1808 wrote to memory of 2412 1808 ugulse.exe 34 PID 1808 wrote to memory of 2412 1808 ugulse.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe"C:\Users\Admin\AppData\Local\Temp\0206f71769d162e7e5e563e2b6592c939ebf608e22e641d97aeb39ae9987b708.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Roaming\Ujso\ugulse.exe"C:\Users\Admin\AppData\Roaming\Ujso\ugulse.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp3444d2f6.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 1164⤵
- Program crash
PID:1120
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1904
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1077888949-2087504227-1401066804-9677459821507446712-1170214561-5717212181413364989"1⤵PID:1488
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5d42ac16d2e7236e4b2e458b28fe174ad
SHA181f3f4b66ca39e42b673bd7f875d7849a189ab3d
SHA256885635ca4a7a1559a3f724febb623ef47496574ea3a714d86897b3c7b823a503
SHA512fb3139b459c4b3dc96b9bbd59abb0d3344f3098e55187f1bfb0ee0edc25efbee2bb565aa7a9cf6d9ab1a4ed4bb81ada84ac930a09d6d204c0ac27c5068c3e10d