Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
2af39aa9a610a96f8d3133f44d8c8964b6884e9e85e99ace77aa7654844561f5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2af39aa9a610a96f8d3133f44d8c8964b6884e9e85e99ace77aa7654844561f5.exe
Resource
win10v2004-20240226-en
General
-
Target
2af39aa9a610a96f8d3133f44d8c8964b6884e9e85e99ace77aa7654844561f5.exe
-
Size
469KB
-
MD5
fb2df9632a77195b395dd024a4db5d7d
-
SHA1
042103bd32dca993e91f4dd2a28c3f7f2782d7d1
-
SHA256
2af39aa9a610a96f8d3133f44d8c8964b6884e9e85e99ace77aa7654844561f5
-
SHA512
f0cffe99b2200006eac865669b30a41ef69ad6b5a05c7f2ab573b7194045db3991f13a3bd5e7dfdbed91642a30113504a769d310c0b8ccb9db4062606f4c2d1f
-
SSDEEP
12288:jclc87eqqV5e+wBV6O++7nDeW3RISGJM3rNRnd/TpF:jcSqqHeVBxlfeWCt6rnlT/
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2156 autopugc.exe 3000 ~5D9A.tmp 2640 bitsexer.exe -
Loads dropped DLL 3 IoCs
pid Process 2504 2af39aa9a610a96f8d3133f44d8c8964b6884e9e85e99ace77aa7654844561f5.exe 2504 2af39aa9a610a96f8d3133f44d8c8964b6884e9e85e99ace77aa7654844561f5.exe 2156 autopugc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\evenutil = "C:\\Users\\Admin\\AppData\\Roaming\\cmdk_ssp\\autopugc.exe" 2af39aa9a610a96f8d3133f44d8c8964b6884e9e85e99ace77aa7654844561f5.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\bitsexer.exe 2af39aa9a610a96f8d3133f44d8c8964b6884e9e85e99ace77aa7654844561f5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2156 autopugc.exe 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2156 autopugc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2156 2504 2af39aa9a610a96f8d3133f44d8c8964b6884e9e85e99ace77aa7654844561f5.exe 28 PID 2504 wrote to memory of 2156 2504 2af39aa9a610a96f8d3133f44d8c8964b6884e9e85e99ace77aa7654844561f5.exe 28 PID 2504 wrote to memory of 2156 2504 2af39aa9a610a96f8d3133f44d8c8964b6884e9e85e99ace77aa7654844561f5.exe 28 PID 2504 wrote to memory of 2156 2504 2af39aa9a610a96f8d3133f44d8c8964b6884e9e85e99ace77aa7654844561f5.exe 28 PID 2156 wrote to memory of 3000 2156 autopugc.exe 29 PID 2156 wrote to memory of 3000 2156 autopugc.exe 29 PID 2156 wrote to memory of 3000 2156 autopugc.exe 29 PID 2156 wrote to memory of 3000 2156 autopugc.exe 29 PID 3000 wrote to memory of 1360 3000 ~5D9A.tmp 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\2af39aa9a610a96f8d3133f44d8c8964b6884e9e85e99ace77aa7654844561f5.exe"C:\Users\Admin\AppData\Local\Temp\2af39aa9a610a96f8d3133f44d8c8964b6884e9e85e99ace77aa7654844561f5.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Roaming\cmdk_ssp\autopugc.exe"C:\Users\Admin\AppData\Roaming\cmdk_ssp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\~5D9A.tmp1360 480264 2156 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000
-
-
-
-
C:\Windows\SysWOW64\bitsexer.exeC:\Windows\SysWOW64\bitsexer.exe -s1⤵
- Executes dropped EXE
PID:2640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
469KB
MD56834f94fb34dc4af03c8b924a2ca6c8a
SHA1cd9a69fc75aa528cfa10e956fb31f1fd426a8248
SHA2565649fc9c7159969d903ea1d56565209a0c968f936098f2dbabd1308f77427a34
SHA512f8686097358338becc265ea402e99a188ccb45665cc587ab202fa48ec16f088e009900526cbc20549c4c240616d3c4b81982ffa6c58d6a369fa4f2fd0ba63ecc