Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 19:04

General

  • Target

    5bf49a2a344edb120b44ae6b0ad5891245e6a3c46189237b32c9f4b056fa5644N.exe

  • Size

    72KB

  • MD5

    1e4d9acc849b60a5088b65d115df1420

  • SHA1

    6a3eee5fba5f91d92e1c3a91a300706dfa16574c

  • SHA256

    5bf49a2a344edb120b44ae6b0ad5891245e6a3c46189237b32c9f4b056fa5644

  • SHA512

    4685a70343767dedc29d61d893304093c1e1093eaf55d8757c3decb7d93b3b94721d21c52f18fd50918d9efcdf53b639087608aece6967f133bfb0daab1de7e8

  • SSDEEP

    1536:x5FNAlTnd+5rO0PxfXZVBZq5qYXMEIcSg:XTAlOO0Pxfznq5zXug

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Indicator Removal: Clear Persistence 1 TTPs 1 IoCs

    remove IFEO.

  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:432
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1216
        • C:\Users\Admin\AppData\Local\Temp\5bf49a2a344edb120b44ae6b0ad5891245e6a3c46189237b32c9f4b056fa5644N.exe
          "C:\Users\Admin\AppData\Local\Temp\5bf49a2a344edb120b44ae6b0ad5891245e6a3c46189237b32c9f4b056fa5644N.exe"
          2⤵
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2092
          • C:\Windows\SysWOW64\uclivoaf-eagur.exe
            "C:\Windows\SysWOW64\uclivoaf-eagur.exe"
            3⤵
            • Windows security bypass
            • Boot or Logon Autostart Execution: Active Setup
            • Event Triggered Execution: Image File Execution Options Injection
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Indicator Removal: Clear Persistence
            • Modifies WinLogon
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1708
            • C:\Windows\SysWOW64\uclivoaf-eagur.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:1672

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\akgeaniv-oucac.exe

        Filesize

        73KB

        MD5

        d59654abab4fd2d49bc649a6cc503ba2

        SHA1

        33c5e3bee58839f6d70a1572090bc12fd669323e

        SHA256

        c078dba616da3861e7dc4b12f210db502b5de88f23c4871167201e71b91165e5

        SHA512

        cc474ce6cd9d76bb4fe93220e7af0a0168620886a907d6f202349ca0ed72a9f8ef0d8d701b8b26872dd25a31c30efa1ace2e3085969c7f5d2ef7696417405205

      • C:\Windows\SysWOW64\oucbifoor-idum.exe

        Filesize

        72KB

        MD5

        c8b8e16540e3b220f40c3bea46ab1c12

        SHA1

        4ab05ed1d6735058b56fb02751d7538c52395c70

        SHA256

        1a63b1c04eee3ccd9de5e0cee29d02516e9b4acd591ee0fa106d1e2efebee96f

        SHA512

        7053bfca97e916d18807e143433f1341b0d54f0dd6b780d5458e5d36b917d689dcc75af1685bd8b6fcd8612fca6a48bed1af173ad43b09f72e4e20cca8ec87d7

      • C:\Windows\SysWOW64\ulkeadak.dll

        Filesize

        5KB

        MD5

        f37b21c00fd81bd93c89ce741a88f183

        SHA1

        b2796500597c68e2f5638e1101b46eaf32676c1c

        SHA256

        76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

        SHA512

        252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

      • \Windows\SysWOW64\uclivoaf-eagur.exe

        Filesize

        70KB

        MD5

        b8cc9fe7d1840ecd71fd24cfdda854bc

        SHA1

        935a1f04733722c3918810c5174b387f6beb1fec

        SHA256

        6b0f97eb129528df88d0c90ebaa572ad89111624142501ea72f19c6890032529

        SHA512

        379a3830b7b13655fab55836acc1de5cc5f33c64118d588a7936e6f4c40aae97d88760bbd1d0200228e6b2f135470bfe50bcecce95e34e8d21dff2cdfada1723

      • memory/1672-51-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/1708-47-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/2092-7-0x0000000000400000-0x0000000000403000-memory.dmp

        Filesize

        12KB