Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02/05/2024, 04:05

General

  • Target

    d3071f857c750001e71c28c231437be23d1730f27d6f83af821fac97241c1b3e.exe

  • Size

    72KB

  • MD5

    b275d77dfd654995bf6ccd19ac016ab4

  • SHA1

    bb18b76c3ee0c1467eb8acf1595bf6fc70989f9d

  • SHA256

    d3071f857c750001e71c28c231437be23d1730f27d6f83af821fac97241c1b3e

  • SHA512

    233c8cbf62f0b3e7f76c5ce7b34a2118daf026242dafa15995c3c6d890892f5c95b6bc38f79591bedbdf72a1b9fd3c96aeb0f854c2395110c8039b6f33852a40

  • SSDEEP

    768:x/n1OLN/xCc0dctPdom0zoEwxq0IEkBVayhtptDk5oSdPUeo0P/uUL6rUlIdUdRm:xdOnr5IE6P1tAXDPf6YlIdU3ddPN8

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:436
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1208
        • C:\Users\Admin\AppData\Local\Temp\d3071f857c750001e71c28c231437be23d1730f27d6f83af821fac97241c1b3e.exe
          "C:\Users\Admin\AppData\Local\Temp\d3071f857c750001e71c28c231437be23d1730f27d6f83af821fac97241c1b3e.exe"
          2⤵
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:1752
          • C:\Windows\SysWOW64\udnoneat-exur.exe
            "C:\Windows\SysWOW64\udnoneat-exur.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2240
            • C:\Windows\SysWOW64\udnoneat-exur.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:2536

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\eatmofok.exe

              Filesize

              73KB

              MD5

              bcb1b9d201d0bc784e0c283ec9679c65

              SHA1

              7c657de0bfe086c0c1eb798faf06180f2b5e77da

              SHA256

              6b4cd8dae58ffab96f57d34aa80d18a8ae60718597672488e5c13dc1027eccc1

              SHA512

              57667fa70981c14cd00104c6b4868ef4327f83c543bd7db34c3ca056654b9361c2e2ee0ecfb2937783c73de3e849543c8ff9504d2c2ea1d60c4d67293174462a

            • C:\Windows\SysWOW64\olrotuk.dll

              Filesize

              5KB

              MD5

              f37b21c00fd81bd93c89ce741a88f183

              SHA1

              b2796500597c68e2f5638e1101b46eaf32676c1c

              SHA256

              76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

              SHA512

              252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

            • C:\Windows\SysWOW64\ublupeat.exe

              Filesize

              72KB

              MD5

              ce9026715089fe5a80f48584649d5172

              SHA1

              8eab470875508dd6055c7021767a2781aae20e6b

              SHA256

              403409d014118350ba382a7a2a657f7ac8f51bc5cb14d75e693db79ea0151b6e

              SHA512

              152cefde76d0d4718576e5c4a17c5a2356687d45280b881c4a5b9851363ad0540e9bd499bb652c21cdce63c6e0b4e74469b9278b6c8abc675f30511dba2b6699

            • \Windows\SysWOW64\udnoneat-exur.exe

              Filesize

              70KB

              MD5

              617fc42ed383f567435017b84f0f5e56

              SHA1

              2628baddec04c647cf16e966ec7c466e70853c83

              SHA256

              9da0c3a5f16bd8dd7a32067a407a325fd72013f4a0b781d19ac2c2ac605ab816

              SHA512

              36b1fa249bf19a076ff05128638e9e2d5dc46f679f91a0b457a1e44389b1a70ab493c2537f02d24dc9cf8f6f810383382dee39fe76ac6e22c8725e1bbe1d8985

            • memory/1752-7-0x0000000000400000-0x0000000000403000-memory.dmp

              Filesize

              12KB

            • memory/2240-53-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/2536-54-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB