Resubmissions
15/04/2024, 11:17
240415-ndzk8sfd4y 1010/04/2024, 03:11
240410-dp1ybsce57 1010/04/2024, 03:11
240410-dp1bssfg91 1010/04/2024, 03:11
240410-dpw95sce56 1010/04/2024, 03:11
240410-dpwzdafg9y 1022/12/2023, 01:14
231222-bl52rsddf7 10Analysis
-
max time kernel
600s -
max time network
604s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10/04/2024, 03:11
Behavioral task
behavioral1
Sample
4307ea6dc3759c609a950c11763ebe3e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4307ea6dc3759c609a950c11763ebe3e.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
4307ea6dc3759c609a950c11763ebe3e.exe
Resource
win10v2004-20240226-en
General
-
Target
4307ea6dc3759c609a950c11763ebe3e.exe
-
Size
209KB
-
MD5
4307ea6dc3759c609a950c11763ebe3e
-
SHA1
dbfe522524e2157b62939e11fba0caea4b5758eb
-
SHA256
7582fd4ed2e0b92d254962953083d90b3324d41a3a81ff30f146af4b3ae4e442
-
SHA512
2afc23f09d5369fb036b8f8e831019ba6dd309d49662d9a8e85322bdd9d1c33e349454f2ba86621b01469efe3175ed9d38612691e34d6862f98d469281ca19a9
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1U6:cnLh9yn52rpUR5vHuRYpM+6
Malware Config
Extracted
systembc
yan0212.com:4039
yan0212.net:4039
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1916 uehv.exe -
resource yara_rule behavioral2/files/0x000800000001abb8-6.dat upx -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 4 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\uehv.job 4307ea6dc3759c609a950c11763ebe3e.exe File opened for modification C:\Windows\Tasks\uehv.job 4307ea6dc3759c609a950c11763ebe3e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4972 4307ea6dc3759c609a950c11763ebe3e.exe 4972 4307ea6dc3759c609a950c11763ebe3e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4307ea6dc3759c609a950c11763ebe3e.exe"C:\Users\Admin\AppData\Local\Temp\4307ea6dc3759c609a950c11763ebe3e.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
C:\ProgramData\puat\uehv.exeC:\ProgramData\puat\uehv.exe start1⤵
- Executes dropped EXE
PID:1916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD54307ea6dc3759c609a950c11763ebe3e
SHA1dbfe522524e2157b62939e11fba0caea4b5758eb
SHA2567582fd4ed2e0b92d254962953083d90b3324d41a3a81ff30f146af4b3ae4e442
SHA5122afc23f09d5369fb036b8f8e831019ba6dd309d49662d9a8e85322bdd9d1c33e349454f2ba86621b01469efe3175ed9d38612691e34d6862f98d469281ca19a9