Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
c67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233.exe
Resource
win10v2004-20240508-en
General
-
Target
c67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233.exe
-
Size
70KB
-
MD5
7f406fc6a7e4013ea459b251fba48f90
-
SHA1
3bc33b0508215db65991f2ff0be1dbadcfcba83e
-
SHA256
c67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233
-
SHA512
8dac69c8b72b91512d970e39eaa0fc89fa58fd2bae3b09f91a53d652fc46eed2d7899166fa3664c50a4b762df9ad5d5f0b67798fb36002ec60302bc7ac56187e
-
SSDEEP
1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8K8WoA:Olg35GTslA5t3/w8KZP
Malware Config
Signatures
-
Processes:
ufxuhov.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ufxuhov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ufxuhov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ufxuhov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ufxuhov.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
ufxuhov.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F424A49-5955-4945-4F42-4A4959554945}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" ufxuhov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F424A49-5955-4945-4F42-4A4959554945}\IsInstalled = "1" ufxuhov.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F424A49-5955-4945-4F42-4A4959554945}\StubPath = "C:\\Windows\\system32\\kfetoab-erat.exe" ufxuhov.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F424A49-5955-4945-4F42-4A4959554945} ufxuhov.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
Processes:
ufxuhov.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe ufxuhov.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" ufxuhov.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\upcukoar.exe" ufxuhov.exe -
Executes dropped EXE 2 IoCs
Processes:
ufxuhov.exeufxuhov.exepid process 2416 ufxuhov.exe 3560 ufxuhov.exe -
Processes:
ufxuhov.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ufxuhov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ufxuhov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ufxuhov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ufxuhov.exe -
Modifies WinLogon 2 TTPs 5 IoCs
Processes:
ufxuhov.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} ufxuhov.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify ufxuhov.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" ufxuhov.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\ivtoaheah.dll" ufxuhov.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" ufxuhov.exe -
Drops file in System32 directory 9 IoCs
Processes:
ufxuhov.exec67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ivtoaheah.dll ufxuhov.exe File created C:\Windows\SysWOW64\ivtoaheah.dll ufxuhov.exe File opened for modification C:\Windows\SysWOW64\ufxuhov.exe ufxuhov.exe File opened for modification C:\Windows\SysWOW64\ufxuhov.exe c67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233.exe File created C:\Windows\SysWOW64\ufxuhov.exe c67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233.exe File opened for modification C:\Windows\SysWOW64\kfetoab-erat.exe ufxuhov.exe File opened for modification C:\Windows\SysWOW64\upcukoar.exe ufxuhov.exe File created C:\Windows\SysWOW64\upcukoar.exe ufxuhov.exe File created C:\Windows\SysWOW64\kfetoab-erat.exe ufxuhov.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ufxuhov.exeufxuhov.exepid process 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 3560 ufxuhov.exe 3560 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe 2416 ufxuhov.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
c67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233.exeufxuhov.exedescription pid process Token: SeDebugPrivilege 2348 c67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233.exe Token: SeDebugPrivilege 2416 ufxuhov.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233.exeufxuhov.exedescription pid process target process PID 2348 wrote to memory of 2416 2348 c67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233.exe ufxuhov.exe PID 2348 wrote to memory of 2416 2348 c67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233.exe ufxuhov.exe PID 2348 wrote to memory of 2416 2348 c67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233.exe ufxuhov.exe PID 2416 wrote to memory of 3560 2416 ufxuhov.exe ufxuhov.exe PID 2416 wrote to memory of 3560 2416 ufxuhov.exe ufxuhov.exe PID 2416 wrote to memory of 3560 2416 ufxuhov.exe ufxuhov.exe PID 2416 wrote to memory of 616 2416 ufxuhov.exe winlogon.exe PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE PID 2416 wrote to memory of 3500 2416 ufxuhov.exe Explorer.EXE
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\c67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233.exe"C:\Users\Admin\AppData\Local\Temp\c67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233.exe"2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ufxuhov.exe"C:\Windows\system32\ufxuhov.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ufxuhov.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\ivtoaheah.dllFilesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
C:\Windows\SysWOW64\kfetoab-erat.exeFilesize
73KB
MD58af396a7c82f5c3d55f7b0b2dee11189
SHA1beeee9a9eac9b3d2573b25c9c4b612e431f70219
SHA2568985fbde52c8f921c00b415879fb5d4f1359d78c7c468a5ee0f533cea6777800
SHA5121b23085cce0edbe9de261d8d1de473406f615b44eafc4bb3162950c4996ab234c0edfae75902ba734293634ea60536a374a835cc5ab0e5852ac1f3bc3d5b8640
-
C:\Windows\SysWOW64\ufxuhov.exeFilesize
70KB
MD57f406fc6a7e4013ea459b251fba48f90
SHA13bc33b0508215db65991f2ff0be1dbadcfcba83e
SHA256c67a346c6cf5802a82b3b3ef3efaa855101e5955fe29faaf1921e752b455d233
SHA5128dac69c8b72b91512d970e39eaa0fc89fa58fd2bae3b09f91a53d652fc46eed2d7899166fa3664c50a4b762df9ad5d5f0b67798fb36002ec60302bc7ac56187e
-
C:\Windows\SysWOW64\upcukoar.exeFilesize
74KB
MD5fae55a1d3d1c4dce41d03cdef2a0126d
SHA1ba475003f883c82dd72ec3941d0f2d59c3588c2b
SHA25635258c91fd476537e189d85ac76ed78ad024a3e0d4cbefa73787dbf952485c23
SHA512ee2eef3369537c7a72ee4d5c1451d50e41dba9db4db95496c5ddb079edbfbdc72563cb0137c18d3b662d8f57acecaa1bf05767421bc66e83f4bec2ee6d707246
-
memory/2348-5-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2416-49-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/3560-50-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB