Analysis

  • max time kernel
    119s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-07-2024 12:18

General

  • Target

    b56d7fd778e3fba163770159611151b0N.exe

  • Size

    68KB

  • MD5

    b56d7fd778e3fba163770159611151b0

  • SHA1

    7bd5d6d98698726f7bdf4be888ef4fc3ecaa1bd7

  • SHA256

    7ab2dbc951063032697ce9d452bc134a32408db1c5c30f8dd4251ea34e016eeb

  • SHA512

    3a48e2cd5ad1edf7bac041c87f5f66cbade09c7e0961d2618b5b4b83e3a528290b55173a7e99502744c0ebe17550f7bc3cc5370a5f6ae8a7496408c32a30dae2

  • SSDEEP

    1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8O:Olg35GTslA5t3/w8O

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:620
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3576
        • C:\Users\Admin\AppData\Local\Temp\b56d7fd778e3fba163770159611151b0N.exe
          "C:\Users\Admin\AppData\Local\Temp\b56d7fd778e3fba163770159611151b0N.exe"
          2⤵
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3992
          • C:\Windows\SysWOW64\ftubug-ouhoot.exe
            "C:\Windows\system32\ftubug-ouhoot.exe"
            3⤵
            • Windows security bypass
            • Boot or Logon Autostart Execution: Active Setup
            • Event Triggered Execution: Image File Execution Options Injection
            • Executes dropped EXE
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2116
            • C:\Windows\SysWOW64\ftubug-ouhoot.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:1832

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\ahcirut.dll

        Filesize

        5KB

        MD5

        f37b21c00fd81bd93c89ce741a88f183

        SHA1

        b2796500597c68e2f5638e1101b46eaf32676c1c

        SHA256

        76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

        SHA512

        252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

      • C:\Windows\SysWOW64\akgeagop-icac.exe

        Filesize

        71KB

        MD5

        7f77ccb5f52b48486587c401bc45f671

        SHA1

        a297f57f0bbb8622602fd048d68a968c5a83c427

        SHA256

        2168f180c89a832791da99dbb3c2eaee459cb2e122ccb2ecee45ec47654491dd

        SHA512

        52e9fdae2894bcf0ee54787b059d4711a8844d6233eb0b4fdae5f5acf3218ac921e1a297c3958155875f4abd70a8ec0391d880f05c751c2aa870597fe85fdcf2

      • C:\Windows\SysWOW64\ftubug-ouhoot.exe

        Filesize

        68KB

        MD5

        b56d7fd778e3fba163770159611151b0

        SHA1

        7bd5d6d98698726f7bdf4be888ef4fc3ecaa1bd7

        SHA256

        7ab2dbc951063032697ce9d452bc134a32408db1c5c30f8dd4251ea34e016eeb

        SHA512

        3a48e2cd5ad1edf7bac041c87f5f66cbade09c7e0961d2618b5b4b83e3a528290b55173a7e99502744c0ebe17550f7bc3cc5370a5f6ae8a7496408c32a30dae2

      • C:\Windows\SysWOW64\ucbamoh-udum.exe

        Filesize

        70KB

        MD5

        dee0dc510f1393ac368d6045e38d5ea1

        SHA1

        8357611cd197d1636a99933e25f3e1d6e3cf41b3

        SHA256

        9c034e474ec1d533858649f3c5da3d30bd6855b2765fd4cff9fcf76a4108451b

        SHA512

        f9848c07edb252bce9afa3d5d5ba607c147e7ea3e6c9391d14ed5431c187290536084a6dd6acbddbb7f51bb145dcff51a88362103017ea3f642bfaf31cc9bce7

      • memory/1832-50-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/2116-49-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/3992-5-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB