Analysis
-
max time kernel
27s -
max time network
37s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-07-2024 22:07
Behavioral task
behavioral1
Sample
SK5UOIY7PM.exe
Resource
win11-20240611-en
General
-
Target
SK5UOIY7PM.exe
-
Size
4.9MB
-
MD5
6785144a0ecb7fb6754c61da7ba3612b
-
SHA1
83528ab1782a9d21a82845dd1f519ed3f252b61a
-
SHA256
7dd73af4a4845b7df80ad1aabd8fc269395c9ba515312e26645e6339cb9fd765
-
SHA512
e22d56532c02a5342c70bf34fff85be2e6510afd108f01f322a2c4c2f68f8051dc4ec481a308df56bb98001c1fb6e655e7b5d2d42c5c177a58e4c2e124b24775
-
SSDEEP
98304:i/cRg1mAbtevr9bUHR+SoATt567/CPDMV9AFZtPT3nvRBQzxr:i/qz9bUHR+wTXICrRFZt7/bQ1r
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
U591RT4ILT.exepid process 3076 U591RT4ILT.exe -
Processes:
resource yara_rule behavioral1/memory/3308-1-0x00007FF7EB5C0000-0x00007FF7EBFA5000-memory.dmp vmprotect C:\Users\Admin\AppData\Local\Temp\U591RT4ILT.exe vmprotect behavioral1/memory/3076-9-0x00007FF7B8BB0000-0x00007FF7B959C000-memory.dmp vmprotect -
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exeipconfig.exeipconfig.exepid process 4940 ipconfig.exe 2500 ipconfig.exe 2604 ipconfig.exe 336 ipconfig.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 3184 taskkill.exe 2836 taskkill.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
taskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 3184 taskkill.exe Token: SeDebugPrivilege 2836 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
SK5UOIY7PM.exeU591RT4ILT.exepid process 3308 SK5UOIY7PM.exe 3076 U591RT4ILT.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
SK5UOIY7PM.execmd.exenet.execmd.execmd.execmd.execmd.execmd.exeU591RT4ILT.execmd.exenet.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3308 wrote to memory of 860 3308 SK5UOIY7PM.exe cmd.exe PID 3308 wrote to memory of 860 3308 SK5UOIY7PM.exe cmd.exe PID 860 wrote to memory of 1716 860 cmd.exe net.exe PID 860 wrote to memory of 1716 860 cmd.exe net.exe PID 1716 wrote to memory of 4964 1716 net.exe net1.exe PID 1716 wrote to memory of 4964 1716 net.exe net1.exe PID 3308 wrote to memory of 1760 3308 SK5UOIY7PM.exe cmd.exe PID 3308 wrote to memory of 1760 3308 SK5UOIY7PM.exe cmd.exe PID 1760 wrote to memory of 3832 1760 cmd.exe w32tm.exe PID 1760 wrote to memory of 3832 1760 cmd.exe w32tm.exe PID 3308 wrote to memory of 2432 3308 SK5UOIY7PM.exe cmd.exe PID 3308 wrote to memory of 2432 3308 SK5UOIY7PM.exe cmd.exe PID 2432 wrote to memory of 3184 2432 cmd.exe taskkill.exe PID 2432 wrote to memory of 3184 2432 cmd.exe taskkill.exe PID 3308 wrote to memory of 4496 3308 SK5UOIY7PM.exe cmd.exe PID 3308 wrote to memory of 4496 3308 SK5UOIY7PM.exe cmd.exe PID 4496 wrote to memory of 4940 4496 cmd.exe ipconfig.exe PID 4496 wrote to memory of 4940 4496 cmd.exe ipconfig.exe PID 3308 wrote to memory of 4432 3308 SK5UOIY7PM.exe cmd.exe PID 3308 wrote to memory of 4432 3308 SK5UOIY7PM.exe cmd.exe PID 4432 wrote to memory of 2500 4432 cmd.exe ipconfig.exe PID 4432 wrote to memory of 2500 4432 cmd.exe ipconfig.exe PID 3308 wrote to memory of 3076 3308 SK5UOIY7PM.exe U591RT4ILT.exe PID 3308 wrote to memory of 3076 3308 SK5UOIY7PM.exe U591RT4ILT.exe PID 3308 wrote to memory of 4284 3308 SK5UOIY7PM.exe cmd.exe PID 3308 wrote to memory of 4284 3308 SK5UOIY7PM.exe cmd.exe PID 4284 wrote to memory of 3652 4284 cmd.exe PING.EXE PID 4284 wrote to memory of 3652 4284 cmd.exe PING.EXE PID 3076 wrote to memory of 3028 3076 U591RT4ILT.exe cmd.exe PID 3076 wrote to memory of 3028 3076 U591RT4ILT.exe cmd.exe PID 3028 wrote to memory of 1484 3028 cmd.exe net.exe PID 3028 wrote to memory of 1484 3028 cmd.exe net.exe PID 1484 wrote to memory of 2400 1484 net.exe net1.exe PID 1484 wrote to memory of 2400 1484 net.exe net1.exe PID 3076 wrote to memory of 5092 3076 U591RT4ILT.exe cmd.exe PID 3076 wrote to memory of 5092 3076 U591RT4ILT.exe cmd.exe PID 5092 wrote to memory of 4464 5092 cmd.exe w32tm.exe PID 5092 wrote to memory of 4464 5092 cmd.exe w32tm.exe PID 3076 wrote to memory of 1500 3076 U591RT4ILT.exe cmd.exe PID 3076 wrote to memory of 1500 3076 U591RT4ILT.exe cmd.exe PID 1500 wrote to memory of 2836 1500 cmd.exe taskkill.exe PID 1500 wrote to memory of 2836 1500 cmd.exe taskkill.exe PID 3076 wrote to memory of 2288 3076 U591RT4ILT.exe cmd.exe PID 3076 wrote to memory of 2288 3076 U591RT4ILT.exe cmd.exe PID 2288 wrote to memory of 2604 2288 cmd.exe ipconfig.exe PID 2288 wrote to memory of 2604 2288 cmd.exe ipconfig.exe PID 3076 wrote to memory of 944 3076 U591RT4ILT.exe cmd.exe PID 3076 wrote to memory of 944 3076 U591RT4ILT.exe cmd.exe PID 944 wrote to memory of 336 944 cmd.exe ipconfig.exe PID 944 wrote to memory of 336 944 cmd.exe ipconfig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SK5UOIY7PM.exe"C:\Users\Admin\AppData\Local\Temp\SK5UOIY7PM.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exenet start w32time3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync /nowait2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /resync /nowait3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /IM RainbowSix.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
-
C:\Users\Admin\AppData\Local\Temp\U591RT4ILT.exe"C:\Users\Admin\AppData\Local\Temp\U591RT4ILT.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exenet start w32time4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time5⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync /nowait3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /resync /nowait4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /IM RainbowSix.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns4⤵
- Gathers network information
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns4⤵
- Gathers network information
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\SK5UOIY7PM.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\U591RT4ILT.exeFilesize
4.9MB
MD56261ee4279a2f896625ca965ad014fb7
SHA10bbd43aed75d13993e364cd7e26393d2b4fefb50
SHA2565b36923b5ab87c82b33614790f2ab2add6b8675ebd27ba278f1eaf2499848cdd
SHA51240d39aa83b603ec5b9b2260d9976663decdf49799e6387b7f4a557e6e5662e5246b75ec97507af4c117cd6aafbd9ebb332f705961e50fd68830df19dd9bbd3f8
-
memory/3076-9-0x00007FF7B8BB0000-0x00007FF7B959C000-memory.dmpFilesize
9.9MB
-
memory/3308-1-0x00007FF7EB5C0000-0x00007FF7EBFA5000-memory.dmpFilesize
9.9MB