Analysis
-
max time kernel
123s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
cf1c390eeb26fbff647586a1a05e4fe11957af00a4098258e841e18a1d421f15.exe
Resource
win7-20240215-en
General
-
Target
cf1c390eeb26fbff647586a1a05e4fe11957af00a4098258e841e18a1d421f15.exe
-
Size
662KB
-
MD5
d031aae0c4b488067297beb2dc26460f
-
SHA1
7a2fa90c458468651846532d2876eefc7fe15ea2
-
SHA256
cf1c390eeb26fbff647586a1a05e4fe11957af00a4098258e841e18a1d421f15
-
SHA512
4c7538977edf03602b9b4c29acf4e428850a46cfd9bb448dbc39277d75b4536977baa3c0f370ec2065a837af49d049be14a0fd936b06955dcfb352d6ce3ab3d0
-
SSDEEP
12288:GubsNSOetfARQAPyGUu7zhubsNSOetfARQAPyGUfT+tkrnC/bv8:GubsnafAPyjSzhubsnafAPyjZrnEL8
Malware Config
Extracted
systembc
cobusabobus.cam:4001
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2564 work.exe 2456 pgdrad.exe 2424 uqia.exe 2692 uqia.exe -
Loads dropped DLL 5 IoCs
pid Process 1668 cmd.exe 2564 work.exe 2564 work.exe 2564 work.exe 2564 work.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\uqia.job pgdrad.exe File opened for modification C:\Windows\Tasks\uqia.job pgdrad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2456 pgdrad.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1668 1656 cf1c390eeb26fbff647586a1a05e4fe11957af00a4098258e841e18a1d421f15.exe 28 PID 1656 wrote to memory of 1668 1656 cf1c390eeb26fbff647586a1a05e4fe11957af00a4098258e841e18a1d421f15.exe 28 PID 1656 wrote to memory of 1668 1656 cf1c390eeb26fbff647586a1a05e4fe11957af00a4098258e841e18a1d421f15.exe 28 PID 1656 wrote to memory of 1668 1656 cf1c390eeb26fbff647586a1a05e4fe11957af00a4098258e841e18a1d421f15.exe 28 PID 1668 wrote to memory of 2564 1668 cmd.exe 30 PID 1668 wrote to memory of 2564 1668 cmd.exe 30 PID 1668 wrote to memory of 2564 1668 cmd.exe 30 PID 1668 wrote to memory of 2564 1668 cmd.exe 30 PID 2564 wrote to memory of 2456 2564 work.exe 31 PID 2564 wrote to memory of 2456 2564 work.exe 31 PID 2564 wrote to memory of 2456 2564 work.exe 31 PID 2564 wrote to memory of 2456 2564 work.exe 31 PID 2408 wrote to memory of 2424 2408 taskeng.exe 33 PID 2408 wrote to memory of 2424 2408 taskeng.exe 33 PID 2408 wrote to memory of 2424 2408 taskeng.exe 33 PID 2408 wrote to memory of 2424 2408 taskeng.exe 33 PID 2408 wrote to memory of 2692 2408 taskeng.exe 36 PID 2408 wrote to memory of 2692 2408 taskeng.exe 36 PID 2408 wrote to memory of 2692 2408 taskeng.exe 36 PID 2408 wrote to memory of 2692 2408 taskeng.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf1c390eeb26fbff647586a1a05e4fe11957af00a4098258e841e18a1d421f15.exe"C:\Users\Admin\AppData\Local\Temp\cf1c390eeb26fbff647586a1a05e4fe11957af00a4098258e841e18a1d421f15.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\pgdrad.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\pgdrad.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2456
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E7F2E39D-F454-4BEE-AA4E-92D404199092} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\ProgramData\bclteu\uqia.exeC:\ProgramData\bclteu\uqia.exe start22⤵
- Executes dropped EXE
PID:2424
-
-
C:\ProgramData\bclteu\uqia.exeC:\ProgramData\bclteu\uqia.exe start22⤵
- Executes dropped EXE
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
335KB
MD52f87330674e2681d5e8dfb1bc792fca7
SHA1d84b9e206c7c403f13054a2e7f959d184426da72
SHA256b6fd1fdecdf771cf1bb62bb80fa412bb06602143ac81af349ba3b18a46fd05b9
SHA512156403f26617380bc0f3a710411d626e14a386922495832d5cb3eeb17fa558da4217bcf5e6a253d6b12ea86bf83648d1a8c7824fcf1e4a6036a6ed21e7f35bf1
-
Filesize
16KB
MD54f01c3d7439dde153ff0110a26e2a71c
SHA140d7203ad4e1fd40e13a56e6f747ee480740873c
SHA256cfb1fd0adf528fcf14647cf3fcd85fb7e4fddd2167b36f9e8b2424b62453df28
SHA512513d09b80e1ac80813bc691e71cdf5348478157350e43b9daed27741b7f5a7a16b2ae4d88ee9951395747c7f2a93ff0c1f2c3753a9e3bad2e2607767a1e3d28e