Analysis
-
max time kernel
120s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 06:07
Static task
static1
Behavioral task
behavioral1
Sample
34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe
Resource
win10v2004-20240802-en
General
-
Target
34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe
-
Size
377KB
-
MD5
e47935f74644aaae0af4f2d72c238d70
-
SHA1
766290a2ba0daca37b1f123ff69447eee87b8efa
-
SHA256
34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072e
-
SHA512
c4e9e4f5debbeaedc36a1fb6c52a150115bbe5f139e5211ec4458bf3fc15c3c2cc7f855d07ca2a9f0cab065c941f1c7a18c8bc36aa144d539274e24fa924cce5
-
SSDEEP
6144:DB8wev8CcOsW1D8fBUTEv8a6dRPMfbt4xb7s5evZJEVe+:DmwevXfsgofyTHREfbSbfvZ4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 348 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 guimpe.exe -
Loads dropped DLL 2 IoCs
pid Process 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D2BEAD48-3C80-AD4F-FE01-FCCCDCDBDFD1} = "C:\\Users\\Admin\\AppData\\Roaming\\Uqix\\guimpe.exe" guimpe.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1984 set thread context of 348 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language guimpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Privacy 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe 3052 guimpe.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 3052 guimpe.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1984 wrote to memory of 3052 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 30 PID 1984 wrote to memory of 3052 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 30 PID 1984 wrote to memory of 3052 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 30 PID 1984 wrote to memory of 3052 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 30 PID 3052 wrote to memory of 1120 3052 guimpe.exe 19 PID 3052 wrote to memory of 1120 3052 guimpe.exe 19 PID 3052 wrote to memory of 1120 3052 guimpe.exe 19 PID 3052 wrote to memory of 1120 3052 guimpe.exe 19 PID 3052 wrote to memory of 1120 3052 guimpe.exe 19 PID 3052 wrote to memory of 1184 3052 guimpe.exe 20 PID 3052 wrote to memory of 1184 3052 guimpe.exe 20 PID 3052 wrote to memory of 1184 3052 guimpe.exe 20 PID 3052 wrote to memory of 1184 3052 guimpe.exe 20 PID 3052 wrote to memory of 1184 3052 guimpe.exe 20 PID 3052 wrote to memory of 1236 3052 guimpe.exe 21 PID 3052 wrote to memory of 1236 3052 guimpe.exe 21 PID 3052 wrote to memory of 1236 3052 guimpe.exe 21 PID 3052 wrote to memory of 1236 3052 guimpe.exe 21 PID 3052 wrote to memory of 1236 3052 guimpe.exe 21 PID 3052 wrote to memory of 1288 3052 guimpe.exe 23 PID 3052 wrote to memory of 1288 3052 guimpe.exe 23 PID 3052 wrote to memory of 1288 3052 guimpe.exe 23 PID 3052 wrote to memory of 1288 3052 guimpe.exe 23 PID 3052 wrote to memory of 1288 3052 guimpe.exe 23 PID 3052 wrote to memory of 1984 3052 guimpe.exe 29 PID 3052 wrote to memory of 1984 3052 guimpe.exe 29 PID 3052 wrote to memory of 1984 3052 guimpe.exe 29 PID 3052 wrote to memory of 1984 3052 guimpe.exe 29 PID 3052 wrote to memory of 1984 3052 guimpe.exe 29 PID 1984 wrote to memory of 348 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 31 PID 1984 wrote to memory of 348 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 31 PID 1984 wrote to memory of 348 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 31 PID 1984 wrote to memory of 348 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 31 PID 1984 wrote to memory of 348 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 31 PID 1984 wrote to memory of 348 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 31 PID 1984 wrote to memory of 348 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 31 PID 1984 wrote to memory of 348 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 31 PID 1984 wrote to memory of 348 1984 34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe"C:\Users\Admin\AppData\Local\Temp\34d886d7d1459b6d421a3e4747d85eeaf9d43b0c24780c153ab6a700f287072eN.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Roaming\Uqix\guimpe.exe"C:\Users\Admin\AppData\Roaming\Uqix\guimpe.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3052
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa1179738.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:348
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309B
MD540dad91b15441de4331dca7983a92de0
SHA130261ab03802d61911e0cf7eab19eefe3bceab60
SHA2561f9bbe3cc293d6d2657378138c9cb23879027a3412f13524a79d3d7cbf59d292
SHA512ffd9609b7bd9a1d67cc8b831bd575b960f2bce5eee8930609c573aaf358e1336f76fc4640ebca8ee5d49ed6a8ea1b323a48d01fdc006ef9960783ffff50f6d65
-
Filesize
377KB
MD5ef93378b4fa6d8b29bd8af6346274f97
SHA1fde961a1f307a07090e8704d5df71b03969540f2
SHA25616e080bac4635115e41c4d4db1fed9df34f557496b333f5487aa1d76be1b4b79
SHA512cc974ad4d13b43615ced040f1c88175aeaba3b9c5c280106021c7b6cfcb5479fedbbd6792313dc758be0ba6105952f07aa85fcc2eec2ddf90810454e93ec475b