Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
f55734aff298258ddb77274dfc93758080b897944132f965f60f5e4772b88540.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f55734aff298258ddb77274dfc93758080b897944132f965f60f5e4772b88540.exe
Resource
win10v2004-20240419-en
General
-
Target
f55734aff298258ddb77274dfc93758080b897944132f965f60f5e4772b88540.exe
-
Size
404KB
-
MD5
207efdbc43c1e29c1d3d3b9b9d843eaa
-
SHA1
85071a2841645b9d2679e8dfcd272510a2f2527f
-
SHA256
f55734aff298258ddb77274dfc93758080b897944132f965f60f5e4772b88540
-
SHA512
7efb1fa7767751f156833a534522e3e6af4ec2f7b0937b5eabd8e1266362f67551435befce8b2f1525eab2c53dc8ff5a99734cc65fd607e049c0be340ec6a0b6
-
SSDEEP
6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse
Malware Config
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 3 2552 rundll32.exe 5 2552 rundll32.exe 8 2552 rundll32.exe 9 2552 rundll32.exe 10 2552 rundll32.exe 13 2552 rundll32.exe 14 2552 rundll32.exe 15 2552 rundll32.exe 17 2552 rundll32.exe 18 2552 rundll32.exe -
Deletes itself 1 IoCs
pid Process 2120 ujksgupvi.exe -
Executes dropped EXE 1 IoCs
pid Process 2120 ujksgupvi.exe -
Loads dropped DLL 6 IoCs
pid Process 1724 cmd.exe 1724 cmd.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dotx = "c:\\windows\\SysWOW64\\rundll32.exe \"c:\\Program Files\\umqyhj\\txfsq.dll\",Verify" rundll32.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: rundll32.exe File opened (read-only) \??\j: rundll32.exe File opened (read-only) \??\s: rundll32.exe File opened (read-only) \??\u: rundll32.exe File opened (read-only) \??\x: rundll32.exe File opened (read-only) \??\h: rundll32.exe File opened (read-only) \??\m: rundll32.exe File opened (read-only) \??\n: rundll32.exe File opened (read-only) \??\o: rundll32.exe File opened (read-only) \??\q: rundll32.exe File opened (read-only) \??\r: rundll32.exe File opened (read-only) \??\v: rundll32.exe File opened (read-only) \??\i: rundll32.exe File opened (read-only) \??\k: rundll32.exe File opened (read-only) \??\p: rundll32.exe File opened (read-only) \??\y: rundll32.exe File opened (read-only) \??\z: rundll32.exe File opened (read-only) \??\a: rundll32.exe File opened (read-only) \??\e: rundll32.exe File opened (read-only) \??\g: rundll32.exe File opened (read-only) \??\l: rundll32.exe File opened (read-only) \??\t: rundll32.exe File opened (read-only) \??\w: rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2552 rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created \??\c:\Program Files\umqyhj\txfsq.dll ujksgupvi.exe File opened for modification \??\c:\Program Files\umqyhj ujksgupvi.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2880 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2552 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2220 f55734aff298258ddb77274dfc93758080b897944132f965f60f5e4772b88540.exe 2120 ujksgupvi.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1724 2220 f55734aff298258ddb77274dfc93758080b897944132f965f60f5e4772b88540.exe 28 PID 2220 wrote to memory of 1724 2220 f55734aff298258ddb77274dfc93758080b897944132f965f60f5e4772b88540.exe 28 PID 2220 wrote to memory of 1724 2220 f55734aff298258ddb77274dfc93758080b897944132f965f60f5e4772b88540.exe 28 PID 2220 wrote to memory of 1724 2220 f55734aff298258ddb77274dfc93758080b897944132f965f60f5e4772b88540.exe 28 PID 1724 wrote to memory of 2880 1724 cmd.exe 30 PID 1724 wrote to memory of 2880 1724 cmd.exe 30 PID 1724 wrote to memory of 2880 1724 cmd.exe 30 PID 1724 wrote to memory of 2880 1724 cmd.exe 30 PID 1724 wrote to memory of 2120 1724 cmd.exe 31 PID 1724 wrote to memory of 2120 1724 cmd.exe 31 PID 1724 wrote to memory of 2120 1724 cmd.exe 31 PID 1724 wrote to memory of 2120 1724 cmd.exe 31 PID 2120 wrote to memory of 2552 2120 ujksgupvi.exe 32 PID 2120 wrote to memory of 2552 2120 ujksgupvi.exe 32 PID 2120 wrote to memory of 2552 2120 ujksgupvi.exe 32 PID 2120 wrote to memory of 2552 2120 ujksgupvi.exe 32 PID 2120 wrote to memory of 2552 2120 ujksgupvi.exe 32 PID 2120 wrote to memory of 2552 2120 ujksgupvi.exe 32 PID 2120 wrote to memory of 2552 2120 ujksgupvi.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f55734aff298258ddb77274dfc93758080b897944132f965f60f5e4772b88540.exe"C:\Users\Admin\AppData\Local\Temp\f55734aff298258ddb77274dfc93758080b897944132f965f60f5e4772b88540.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\ujksgupvi.exe "C:\Users\Admin\AppData\Local\Temp\f55734aff298258ddb77274dfc93758080b897944132f965f60f5e4772b88540.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\ujksgupvi.exeC:\Users\Admin\AppData\Local\Temp\\ujksgupvi.exe "C:\Users\Admin\AppData\Local\Temp\f55734aff298258ddb77274dfc93758080b897944132f965f60f5e4772b88540.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
\??\c:\windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.exe "c:\Program Files\umqyhj\txfsq.dll",Verify C:\Users\Admin\AppData\Local\Temp\ujksgupvi.exe4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5fa8cba4baed9d7adfc3c4b3644dd4489
SHA1ee6c54b90d1f628da82f68c0512b570ff73e3a95
SHA256f9275ae57aff64a48687d6bf49d7ed5f73bf714a122900c29b5a192492b13bbd
SHA5127d6da49aa03a0081073e31bcde3db9d23f893d4d7a31dec34a22b3f09eeed60f0b7d9d6b42f4f128d59f9002f16eaff7630bb8b9d39950a8bd6efaa63e6b6cd9
-
Filesize
405KB
MD51b282413693f67ed5bc20e0958f9bcc6
SHA1dc974e0a134e51480c58829a33899e806d6ec4dd
SHA256aa1c7be51ee90868fabbcfe47a1b0e9a0f5722582c2eadfbfff7d5d2fb95afbc
SHA51251927bf4a4d256b4be9b400b5c6c8ad09ec9e7bfafe8014e68a1847079d7a80e3d4a4bfac530c484d870adfb506ce26a428fa33faf964b16df8389769440ad42