Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
Uhe_KeyGen.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Uhe_KeyGen.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$TEMP/BASSMOD.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$TEMP/BASSMOD.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$TEMP/R2RUHEKG.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$TEMP/R2RUHEKG.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$TEMP/keygen.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$TEMP/keygen.exe
Resource
win10v2004-20240426-en
General
-
Target
Uhe_KeyGen.exe
-
Size
708KB
-
MD5
e4ad77c21fb6497dd469e9e50036832b
-
SHA1
9275ac1286c9ecec3e704d8eea4708295dee1819
-
SHA256
17bfda2d300d5321642789fd5b826318735766d5e5d5c9b2e7c93e520ad87881
-
SHA512
1a4addaaa94aedfc57378c393443ae67240ff0852fd9a1fa4e44a12832505ae0d6c256f419cd677dc3575b196b68d4b688e4b8291267523a58359ca8e5d10d43
-
SSDEEP
12288:XYkc9t2Sll/3Mn6WeH3lgoN8YWo/Pv7vnXvWNqTf6WfydeLPwsgjrPO9:XYkcL53Mnmr4E7n/WNqundIwsg+9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2252 keygen.exe -
Loads dropped DLL 4 IoCs
pid Process 1640 Uhe_KeyGen.exe 1640 Uhe_KeyGen.exe 2252 keygen.exe 2252 keygen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2252 1640 Uhe_KeyGen.exe 28 PID 1640 wrote to memory of 2252 1640 Uhe_KeyGen.exe 28 PID 1640 wrote to memory of 2252 1640 Uhe_KeyGen.exe 28 PID 1640 wrote to memory of 2252 1640 Uhe_KeyGen.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uhe_KeyGen.exe"C:\Users\Admin\AppData\Local\Temp\Uhe_KeyGen.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\keygen.exeC:\Users\Admin\AppData\Local\Temp\keygen.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
783KB
MD56396969ee6b3ca827e008ee8ff829d85
SHA15d5b2fe9f48807dae72f1345e4357b5c6684b402
SHA256e24b0253f243cd78d9730397423213cbcdbd7a13df277edd85600d4a95f2277a
SHA512c8be44a434cfd07c366acf3fe5720bf3f151e84ae449ae3a37140b1e162694bff616bbc393a6c6cef7ab00b74522b4bbb86705df0393e6c90a6e080993c316c3
-
Filesize
33KB
MD5e4ec57e8508c5c4040383ebe6d367928
SHA1b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06
SHA2568ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f
SHA51277d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822
-
Filesize
3KB
MD5abcbaa94b4d828f5c3080c5ddbbbf403
SHA142f8010079fb6222f97557fff9377a7276189968
SHA256940f041a89d78bf62b32771023553f9f3b867d58dd87af679508fff6ed0e9144
SHA51224799c073c878f9d2fbf0b8e01dbe0abcf183b950dd991e7a504cfb5f1d370edc558896b7a4607271569bd2fa512b5d76e6f94155955da5bf67e0a8a12a75465
-
Filesize
554KB
MD5ba7e85562433a89ce3fab455644b3d44
SHA1d84aa7a4128af9ca4b535d17f498f2e70bb5879c
SHA256b98872bfda93afc1c34ead787762425db922b557b5526e8d0b1e10a4bbeb0b57
SHA5124edcfa12c003215bd4f983ffe879fcd336f0cd167ef0708f8e28d7eec6db245c59324026821d020de8df7f0a711737a5b0ec56c48e0de7bfc0d3a91272524dad