Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 20:35
Behavioral task
behavioral1
Sample
400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe
Resource
win10v2004-20240426-en
General
-
Target
400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe
-
Size
134KB
-
MD5
895927d362981a5127405fafad5bedda
-
SHA1
3ccdacb65d3b6247d2a34714908517ee1f52ac26
-
SHA256
400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef
-
SHA512
e8cc0c6c8c4ba673c09ceaf2142f0a8ac1f6b50787ba6b030945520f16a276ab5e23a58f20a57d4ac20b3d2fd0f904298ca92d6d3031ae967ea93710435f401f
-
SSDEEP
1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SOY:YfU/WF6QMauSuiWNi9eNOl0007NZIOY
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 6 IoCs
resource yara_rule behavioral1/memory/3004-0-0x0000000001310000-0x0000000001338000-memory.dmp UPX behavioral1/files/0x0032000000015ba8-6.dat UPX behavioral1/memory/3004-4-0x0000000000FE0000-0x0000000001008000-memory.dmp UPX behavioral1/memory/3004-7-0x0000000001310000-0x0000000001338000-memory.dmp UPX behavioral1/memory/3040-8-0x0000000000FE0000-0x0000000001008000-memory.dmp UPX behavioral1/memory/3004-9-0x0000000001310000-0x0000000001338000-memory.dmp UPX -
Deletes itself 1 IoCs
pid Process 2560 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3040 wuauclt.exe -
Loads dropped DLL 1 IoCs
pid Process 3004 400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe -
resource yara_rule behavioral1/memory/3004-0-0x0000000001310000-0x0000000001338000-memory.dmp upx behavioral1/files/0x0032000000015ba8-6.dat upx behavioral1/memory/3004-4-0x0000000000FE0000-0x0000000001008000-memory.dmp upx behavioral1/memory/3004-7-0x0000000001310000-0x0000000001338000-memory.dmp upx behavioral1/memory/3040-8-0x0000000000FE0000-0x0000000001008000-memory.dmp upx behavioral1/memory/3004-9-0x0000000001310000-0x0000000001338000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" 400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3040 3004 400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe 28 PID 3004 wrote to memory of 3040 3004 400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe 28 PID 3004 wrote to memory of 3040 3004 400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe 28 PID 3004 wrote to memory of 3040 3004 400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe 28 PID 3004 wrote to memory of 2560 3004 400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe 29 PID 3004 wrote to memory of 2560 3004 400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe 29 PID 3004 wrote to memory of 2560 3004 400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe 29 PID 3004 wrote to memory of 2560 3004 400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe"C:\Users\Admin\AppData\Local\Temp\400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
PID:3040
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\400fc25994380d22fe7e6770108fd815d00629fc94b75bf6c43530a5571dbaef.exe" >> NUL2⤵
- Deletes itself
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD57b48f9fe053e4bbdb42c646904798a11
SHA12b51e75571a57a15aa48a21cbc6ad4d6197a72b5
SHA25620cfce9e83cde73adc70c1c5a9dd0b31667b96c55bdef2f4cdb699cb26b37900
SHA5127f712d9ae9634ad78eeebe4792278d6a815613846d71cbe87be623765adb10c63b32b6e239ba9e05a41a86f16beb94e97da4344327aad80601eb2fcafab9d795