Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
c5e263877a0ee75ab91137d2f3d10770.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5e263877a0ee75ab91137d2f3d10770.exe
Resource
win10v2004-20240226-en
General
-
Target
c5e263877a0ee75ab91137d2f3d10770.exe
-
Size
295KB
-
MD5
c5e263877a0ee75ab91137d2f3d10770
-
SHA1
8ad646154bddf5655b43034937ebfaebc47aa231
-
SHA256
119db9e7e0afc32a0789fc0961e300710d4d9705d7330d06b5afb14ab9405f94
-
SHA512
7cae5749bae6142eba2ddb128c402bda16e0ab43edaee9724da655d80674be77bc971f27719c42a174eec7bc52f824023f3e774aaa6bb2d962e6166026d7b6e6
-
SSDEEP
6144:0iGtsLPAlqNC+8+1PTG/qm/PgCnmUSFMhl4o+M/oI29dKP:rGtsLYt+h1PTEn/iUSFM8o+rI2gP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2960 onupi.exe -
Loads dropped DLL 2 IoCs
pid Process 2176 c5e263877a0ee75ab91137d2f3d10770.exe 2176 c5e263877a0ee75ab91137d2f3d10770.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\{4C66D2C8-8463-AD4E-E567-4500C017661D} = "C:\\Users\\Admin\\AppData\\Roaming\\Koqauc\\onupi.exe" onupi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2176 set thread context of 1528 2176 c5e263877a0ee75ab91137d2f3d10770.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 1416 1528 WerFault.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Privacy c5e263877a0ee75ab91137d2f3d10770.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" c5e263877a0ee75ab91137d2f3d10770.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe 2960 onupi.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2176 c5e263877a0ee75ab91137d2f3d10770.exe 2960 onupi.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2960 2176 c5e263877a0ee75ab91137d2f3d10770.exe 28 PID 2176 wrote to memory of 2960 2176 c5e263877a0ee75ab91137d2f3d10770.exe 28 PID 2176 wrote to memory of 2960 2176 c5e263877a0ee75ab91137d2f3d10770.exe 28 PID 2176 wrote to memory of 2960 2176 c5e263877a0ee75ab91137d2f3d10770.exe 28 PID 2960 wrote to memory of 1188 2960 onupi.exe 19 PID 2960 wrote to memory of 1188 2960 onupi.exe 19 PID 2960 wrote to memory of 1188 2960 onupi.exe 19 PID 2960 wrote to memory of 1188 2960 onupi.exe 19 PID 2960 wrote to memory of 1188 2960 onupi.exe 19 PID 2960 wrote to memory of 1300 2960 onupi.exe 20 PID 2960 wrote to memory of 1300 2960 onupi.exe 20 PID 2960 wrote to memory of 1300 2960 onupi.exe 20 PID 2960 wrote to memory of 1300 2960 onupi.exe 20 PID 2960 wrote to memory of 1300 2960 onupi.exe 20 PID 2960 wrote to memory of 1360 2960 onupi.exe 21 PID 2960 wrote to memory of 1360 2960 onupi.exe 21 PID 2960 wrote to memory of 1360 2960 onupi.exe 21 PID 2960 wrote to memory of 1360 2960 onupi.exe 21 PID 2960 wrote to memory of 1360 2960 onupi.exe 21 PID 2960 wrote to memory of 1080 2960 onupi.exe 23 PID 2960 wrote to memory of 1080 2960 onupi.exe 23 PID 2960 wrote to memory of 1080 2960 onupi.exe 23 PID 2960 wrote to memory of 1080 2960 onupi.exe 23 PID 2960 wrote to memory of 1080 2960 onupi.exe 23 PID 2960 wrote to memory of 2176 2960 onupi.exe 27 PID 2960 wrote to memory of 2176 2960 onupi.exe 27 PID 2960 wrote to memory of 2176 2960 onupi.exe 27 PID 2960 wrote to memory of 2176 2960 onupi.exe 27 PID 2960 wrote to memory of 2176 2960 onupi.exe 27 PID 2176 wrote to memory of 1528 2176 c5e263877a0ee75ab91137d2f3d10770.exe 29 PID 2176 wrote to memory of 1528 2176 c5e263877a0ee75ab91137d2f3d10770.exe 29 PID 2176 wrote to memory of 1528 2176 c5e263877a0ee75ab91137d2f3d10770.exe 29 PID 2176 wrote to memory of 1528 2176 c5e263877a0ee75ab91137d2f3d10770.exe 29 PID 2176 wrote to memory of 1528 2176 c5e263877a0ee75ab91137d2f3d10770.exe 29 PID 2176 wrote to memory of 1528 2176 c5e263877a0ee75ab91137d2f3d10770.exe 29 PID 2176 wrote to memory of 1528 2176 c5e263877a0ee75ab91137d2f3d10770.exe 29 PID 2176 wrote to memory of 1528 2176 c5e263877a0ee75ab91137d2f3d10770.exe 29 PID 2176 wrote to memory of 1528 2176 c5e263877a0ee75ab91137d2f3d10770.exe 29 PID 1528 wrote to memory of 1416 1528 cmd.exe 31 PID 1528 wrote to memory of 1416 1528 cmd.exe 31 PID 1528 wrote to memory of 1416 1528 cmd.exe 31 PID 1528 wrote to memory of 1416 1528 cmd.exe 31 PID 2960 wrote to memory of 1836 2960 onupi.exe 30 PID 2960 wrote to memory of 1836 2960 onupi.exe 30 PID 2960 wrote to memory of 1836 2960 onupi.exe 30 PID 2960 wrote to memory of 1836 2960 onupi.exe 30 PID 2960 wrote to memory of 1836 2960 onupi.exe 30 PID 2960 wrote to memory of 1416 2960 onupi.exe 31 PID 2960 wrote to memory of 1416 2960 onupi.exe 31 PID 2960 wrote to memory of 1416 2960 onupi.exe 31 PID 2960 wrote to memory of 1416 2960 onupi.exe 31 PID 2960 wrote to memory of 1416 2960 onupi.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1188
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1300
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\c5e263877a0ee75ab91137d2f3d10770.exe"C:\Users\Admin\AppData\Local\Temp\c5e263877a0ee75ab91137d2f3d10770.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Roaming\Koqauc\onupi.exe"C:\Users\Admin\AppData\Roaming\Koqauc\onupi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2960
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpe0c1ca14.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 1164⤵
- Program crash
PID:1416
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1080
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-11150760214492778357469574241065860984-132614341-1444630169253730976-1842436976"1⤵PID:1836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
295KB
MD5f77486e4eb1d503a10bf42f64951adf5
SHA1e5b2cf011501341732cb485bc1eff5749007b500
SHA2566c67914fc989fce55e297913eca781b9a8ce4f198410d587ab84ee57b2497068
SHA5124fde3c84d702af575a6b398f3813181f4a515aacaed428720dc3dc3c7f18ad5f59fffbd31be96ee6c69f17c11048dd4b03884aaa79fbca400be416286783355c