Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-09-2024 23:22

General

  • Target

    utweb_installer.exe

  • Size

    1.7MB

  • MD5

    f96157e1e760a67d87881b1d6d6d212c

  • SHA1

    d55f02d9a3de815fee0b79f3b4c6dccfc6023933

  • SHA256

    cf3473f9af60276874957585cc30ba4e24c9a98dad38113953ef0682411e6f32

  • SHA512

    b5a70d2b51a6d91dea2905f1bcce18b9a5fe5719299fac8cb6057b3e65122edda3e4f3ba7bdcf5057bec8de399c611506b1cc88f595aa1120a97bbb8622ab828

  • SSDEEP

    49152:tBuZrEUlfz96axutzRGlFHQ2AZopVkrrzzhfVwW:7kLlfx6eu4FHJAZobArwW

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\utweb_installer.exe
    "C:\Users\Admin\AppData\Local\Temp\utweb_installer.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\AppData\Local\Temp\is-KUJM8.tmp\utweb_installer.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-KUJM8.tmp\utweb_installer.tmp" /SL5="$400E0,898126,819200,C:\Users\Admin\AppData\Local\Temp\utweb_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f32e7cbf123b2e7e47b83256dbe18abd

    SHA1

    686639c784d79b6915c6484af822cc47cbf66a29

    SHA256

    026b6d268b349ac8b403d78b14df734e80431d7dd0aa7b9e6a8df96dbd0f7515

    SHA512

    df98825d4b19d91a819b75b5135b397b2cb547e6806035235d387767ddecc370cbe70ff141d6a80100968be873224a3043cc739cd93f8ed05e5c459a0cfd2fd8

  • C:\Users\Admin\AppData\Local\Temp\CabB78E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB7B0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\is-R8L8B.tmp\Logo.png

    Filesize

    12KB

    MD5

    a00cfe887e254c462ad0c6a6d3fb25b6

    SHA1

    c603a192e23df46c719febf07fd4207c96b1f0f9

    SHA256

    bca0271f56f7384942ff3affb79fa78ccdceabf7dda89ad3c138226da324cdb1

    SHA512

    6dc95a05e2712d85067aa92144f7e00871d2f60e377c6df0253e3ff48a02280d4148578fbbf22018693227bdcc035a8bd391f3c390aed39ca58749f28fc19862

  • \Users\Admin\AppData\Local\Temp\is-KUJM8.tmp\utweb_installer.tmp

    Filesize

    3.0MB

    MD5

    b269737f88a280c345c9e7f90b0e631a

    SHA1

    983ad16f587f7676d52a8c8fbd89ef248558591c

    SHA256

    6d1ed3cca1c767b1934bab4c4ad2dba84bf73c795953c9f8aa73fa1615d0357a

    SHA512

    bcb245b9f45ecbeb754ba54e6a6f8101dfd0b01485e35c9f5bbeb88463e58af3a31bcfc5c7fea074fe2e2ad728fb88cbb015e389937f3dfa3a0cfbc72853c4a4

  • \Users\Admin\AppData\Local\Temp\is-R8L8B.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • memory/1668-9-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/1668-126-0x00000000038F0000-0x00000000038FF000-memory.dmp

    Filesize

    60KB

  • memory/1668-135-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/1668-134-0x00000000038F0000-0x00000000038FF000-memory.dmp

    Filesize

    60KB

  • memory/2384-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/2384-0-0x0000000000400000-0x00000000004D5000-memory.dmp

    Filesize

    852KB

  • memory/2384-132-0x0000000000400000-0x00000000004D5000-memory.dmp

    Filesize

    852KB