Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
UGPP2211543.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
UGPP2211543.exe
Resource
win10v2004-20240419-en
General
-
Target
UGPP2211543.exe
-
Size
438KB
-
MD5
a56042db3faeb469b3dfa843e1e95b28
-
SHA1
176258dabf6e2cd6320a22b07850ef3ade7b789e
-
SHA256
dfade890755c0afd9d85acc4f8023a4a81d1be460788bc09757236dd38b20a9c
-
SHA512
44ce8a11abfdc8a1ed0d665b64e57056a520ef2369477ab1ffb98355e91e6df58b34162e5950310912a12cafd5918a23dcac15d15c0609cfa33db0f7a48b3d0f
-
SSDEEP
12288:gslRTliAFIZrLzrhicbcRrsc/CJE6HNpXnNUmP/W:gXJZrcMascZ6Km
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2580 1620 WerFault.exe 27 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2228 notepad.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1620 UGPP2211543.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLoadDriverPrivilege 1620 UGPP2211543.exe Token: SeLoadDriverPrivilege 1620 UGPP2211543.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2228 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28 PID 1620 wrote to memory of 2228 1620 UGPP2211543.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\UGPP2211543.exe"C:\Users\Admin\AppData\Local\Temp\UGPP2211543.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 5402⤵
- Program crash
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79B
MD547cdaf9f1f0753a84a8e768b47e42761
SHA1eb947899b2d4dd00c03eebebb1c9f428761672bc
SHA2567941a4426895eca224e1f95a83ef983f4b6ea4b3499a658860395851a5f138d0
SHA512c33424fdd59702a24089b25f13c5ac40e97f72ee80152a8f687ac1e95ac09e5c2d046de58fa4b698f312f8a126ac53f4f695bc19a44638eb1a97367b57aedb7a