Analysis
-
max time kernel
141s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
Uhe_KeyGen.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Uhe_KeyGen.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$TEMP/BASSMOD.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$TEMP/BASSMOD.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$TEMP/R2RUHEKG.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$TEMP/R2RUHEKG.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$TEMP/keygen.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$TEMP/keygen.exe
Resource
win10v2004-20240426-en
General
-
Target
Uhe_KeyGen.exe
-
Size
708KB
-
MD5
e4ad77c21fb6497dd469e9e50036832b
-
SHA1
9275ac1286c9ecec3e704d8eea4708295dee1819
-
SHA256
17bfda2d300d5321642789fd5b826318735766d5e5d5c9b2e7c93e520ad87881
-
SHA512
1a4addaaa94aedfc57378c393443ae67240ff0852fd9a1fa4e44a12832505ae0d6c256f419cd677dc3575b196b68d4b688e4b8291267523a58359ca8e5d10d43
-
SSDEEP
12288:XYkc9t2Sll/3Mn6WeH3lgoN8YWo/Pv7vnXvWNqTf6WfydeLPwsgjrPO9:XYkcL53Mnmr4E7n/WNqundIwsg+9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4920 keygen.exe -
Loads dropped DLL 3 IoCs
pid Process 4920 keygen.exe 4920 keygen.exe 4920 keygen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1612 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1612 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2032 wrote to memory of 4920 2032 Uhe_KeyGen.exe 83 PID 2032 wrote to memory of 4920 2032 Uhe_KeyGen.exe 83 PID 2032 wrote to memory of 4920 2032 Uhe_KeyGen.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uhe_KeyGen.exe"C:\Users\Admin\AppData\Local\Temp\Uhe_KeyGen.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\keygen.exeC:\Users\Admin\AppData\Local\Temp\keygen.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4920
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x478 0x4701⤵
- Suspicious use of AdjustPrivilegeToken
PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5e4ec57e8508c5c4040383ebe6d367928
SHA1b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06
SHA2568ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f
SHA51277d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822
-
Filesize
3KB
MD5abcbaa94b4d828f5c3080c5ddbbbf403
SHA142f8010079fb6222f97557fff9377a7276189968
SHA256940f041a89d78bf62b32771023553f9f3b867d58dd87af679508fff6ed0e9144
SHA51224799c073c878f9d2fbf0b8e01dbe0abcf183b950dd991e7a504cfb5f1d370edc558896b7a4607271569bd2fa512b5d76e6f94155955da5bf67e0a8a12a75465
-
Filesize
783KB
MD56396969ee6b3ca827e008ee8ff829d85
SHA15d5b2fe9f48807dae72f1345e4357b5c6684b402
SHA256e24b0253f243cd78d9730397423213cbcdbd7a13df277edd85600d4a95f2277a
SHA512c8be44a434cfd07c366acf3fe5720bf3f151e84ae449ae3a37140b1e162694bff616bbc393a6c6cef7ab00b74522b4bbb86705df0393e6c90a6e080993c316c3
-
Filesize
554KB
MD5ba7e85562433a89ce3fab455644b3d44
SHA1d84aa7a4128af9ca4b535d17f498f2e70bb5879c
SHA256b98872bfda93afc1c34ead787762425db922b557b5526e8d0b1e10a4bbeb0b57
SHA5124edcfa12c003215bd4f983ffe879fcd336f0cd167ef0708f8e28d7eec6db245c59324026821d020de8df7f0a711737a5b0ec56c48e0de7bfc0d3a91272524dad