Analysis

  • max time kernel
    580s
  • max time network
    359s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 03:05

General

  • Target

    UIExecutor.exe

  • Size

    285KB

  • MD5

    c152daaf76f20ee8f06be8bb6422d4a2

  • SHA1

    6ce9de47a28aed0324f22d496e4e137180e0b0a9

  • SHA256

    b6ae29d9de7ee942b90bcd5c4ff97fe7ee6510900ca9f86bd560f86d47e35f1f

  • SHA512

    ce8460fb022a5143e1da63b8ed90b654424961d1ed3c7c540e932a3e8881aa262817b305db49ea0f92ac01606ac8b1d045d23c79255a1cc8607e6d200be8a760

  • SSDEEP

    6144:3Q5FtRjkYOmXcIbHh+/iqzgo8kqfogA+Z3fyPj/TLFRkGGof:gJlImjhzToFGX3aPjXFRkGGof

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops desktop.ini file(s) 10 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 7 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\UIExecutor.exe
    "C:\Users\Admin\AppData\Local\Temp\UIExecutor.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1076
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1296
    • C:\Windows\eHome\ehshell.exe
      "C:\Windows\eHome\ehshell.exe" /prefetch:1003 "C:\Users\Admin\Downloads\BackupUpdate.DVR"
      1⤵
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Checks processor information in registry
      • Modifies registry class
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
        "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /SkipFUE /RemoteOCXLaunch /SuppressDialogs
        2⤵
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:1640
    • C:\Windows\ehome\ehshell.exe
      "C:\Windows\ehome\ehshell.exe"
      1⤵
        PID:2968

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Users\Admin\AppData\Roaming\msvcp110.dll

        Filesize

        503KB

        MD5

        dad03d35685bc14f42cf0fb07052c5e0

        SHA1

        662fcedc3fa8b9ca10b9f288bf4e59a2bcd214bb

        SHA256

        13d014a5d923954f23d50eda15202e87965981e162ae64cfb86e73dd1a3b4719

        SHA512

        f49b39d7e8c092df62b7870065516bdcb2fde9d2be91882f89ce94d5efd768222cb0f74b654aea3abb4f88ea03737437ee645aa99491a30c83c278cd6941bef4

      • memory/1076-0-0x0000000074C1E000-0x0000000074C1F000-memory.dmp

        Filesize

        4KB

      • memory/1076-1-0x00000000008A0000-0x00000000008F0000-memory.dmp

        Filesize

        320KB

      • memory/1076-2-0x0000000000310000-0x0000000000316000-memory.dmp

        Filesize

        24KB

      • memory/1076-7-0x00000000776F0000-0x00000000777B1000-memory.dmp

        Filesize

        772KB

      • memory/1076-8-0x0000000074C10000-0x00000000752FE000-memory.dmp

        Filesize

        6.9MB

      • memory/1928-9-0x00000000021A0000-0x0000000002220000-memory.dmp

        Filesize

        512KB

      • memory/1928-11-0x000000001E2B0000-0x000000001E8B8000-memory.dmp

        Filesize

        6.0MB

      • memory/1928-12-0x000000001E8C0000-0x000000001EA44000-memory.dmp

        Filesize

        1.5MB

      • memory/1928-13-0x000000001BAB0000-0x000000001BB4E000-memory.dmp

        Filesize

        632KB

      • memory/1928-14-0x000000001CE80000-0x000000001CF38000-memory.dmp

        Filesize

        736KB

      • memory/1928-15-0x00000000021A0000-0x0000000002220000-memory.dmp

        Filesize

        512KB