Overview
overview
10Static
static
8 (1).exe
windows7_x64
108 (1).exe
windows10_x64
108 (10).exe
windows7_x64
108 (10).exe
windows10_x64
108 (11).exe
windows7_x64
108 (11).exe
windows10_x64
108 (12).exe
windows7_x64
108 (12).exe
windows10_x64
108 (13).exe
windows7_x64
108 (13).exe
windows10_x64
108 (14).exe
windows7_x64
108 (14).exe
windows10_x64
108 (15).exe
windows7_x64
108 (15).exe
windows10_x64
108 (16).exe
windows7_x64
108 (16).exe
windows10_x64
108 (17).exe
windows7_x64
108 (17).exe
windows10_x64
108 (18).exe
windows7_x64
108 (18).exe
windows10_x64
108 (19).exe
windows7_x64
108 (19).exe
windows10_x64
108 (2).exe
windows7_x64
108 (2).exe
windows10_x64
108 (20).exe
windows7_x64
108 (20).exe
windows10_x64
108 (21).exe
windows7_x64
108 (21).exe
windows10_x64
108 (22).exe
windows7_x64
108 (22).exe
windows10_x64
108 (23).exe
windows7_x64
108 (23).exe
windows10_x64
10Resubmissions
13-08-2021 10:16
210813-wpta271jdx 1008-08-2021 23:00
210808-fgs5g9pxfs 1007-08-2021 23:12
210807-g2jw1lmd4a 1007-08-2021 16:10
210807-51nhct4kfx 1006-08-2021 23:43
210806-gc2271nxwj 1006-08-2021 06:00
210806-f443x39x8a 1005-08-2021 17:08
210805-97y6banvvx 1004-08-2021 17:25
210804-hkxx2ntr8x 1004-08-2021 12:12
210804-rjbg4b4y7n 1003-08-2021 17:12
210803-r2h7ytjwqj 10Analysis
-
max time kernel
3s -
max time network
54s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
28-07-2021 23:45
Static task
static1
Behavioral task
behavioral1
Sample
8 (1).exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
8 (1).exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
8 (10).exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
8 (10).exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
8 (11).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
8 (11).exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
8 (12).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
8 (12).exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
8 (13).exe
Resource
win7v20210408
Behavioral task
behavioral10
Sample
8 (13).exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
8 (14).exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
8 (14).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
8 (15).exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
8 (15).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
8 (16).exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
8 (16).exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
8 (17).exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
8 (17).exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
8 (18).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
8 (18).exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
8 (19).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
8 (19).exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
8 (2).exe
Resource
win7v20210408
Behavioral task
behavioral24
Sample
8 (2).exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
8 (20).exe
Resource
win7v20210408
Behavioral task
behavioral26
Sample
8 (20).exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
8 (21).exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
8 (21).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
8 (22).exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
8 (22).exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
8 (23).exe
Resource
win7v20210410
Behavioral task
behavioral32
Sample
8 (23).exe
Resource
win10v20210408
General
-
Target
8 (21).exe
-
Size
3.0MB
-
MD5
bb072cad921aa5ce8b97706ce01bc570
-
SHA1
18bf034906c1341b7817e7361ad27a4425d820bd
-
SHA256
817a50d00909383bbef41e6f4e61b527d55f0873bcf745b29dbba75f52fe2e97
-
SHA512
d40e5f77d882ed29bd9de5a6848072e2f81cd02176955e2b1a4aedcdf4eb687d77bebe33cef0c7d702bc828181755f86e2564523d476adbb785f396a5ce1d474
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rUNdlL32.eXedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4328 4276 rUNdlL32.eXe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS01A58104\setup_install.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS01A58104\setup_install.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS01A58104\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS01A58104\libcurl.dll aspack_v212_v242 -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 ipinfo.io 19 ip-api.com 14 ipinfo.io -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3496 4048 WerFault.exe setup_install.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8 (21).exe"C:\Users\Admin\AppData\Local\Temp\8 (21).exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS01A58104\setup_install.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_5.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_5.exesonia_5.exe5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 5324⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_7.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_6.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_4.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_3.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_1.exesonia_1.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_1.exe"C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_1.exe" -a2⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_6.exesonia_6.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_4.exesonia_4.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_3.exesonia_3.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_2.exesonia_2.exe1⤵
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\setup_install.exeMD5
a3ca32ebdba2c07c2d386bb31cbd6d51
SHA1e7841e1f475f922d5264b5ce5d123a1b3927f9e6
SHA2560ab2a0bdb8e7a72b5eacb1af5325036266987c5d00b13a981c95754a94f55b1b
SHA512c8abd3a0c8004c11462bf139a873311333cbe6c26046810844199f67d6dd9d7196a7e168261013c50bcb9f24a6bdd37879f617d7aa2089d2a067cb6ca09cbaea
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\setup_install.exeMD5
a3ca32ebdba2c07c2d386bb31cbd6d51
SHA1e7841e1f475f922d5264b5ce5d123a1b3927f9e6
SHA2560ab2a0bdb8e7a72b5eacb1af5325036266987c5d00b13a981c95754a94f55b1b
SHA512c8abd3a0c8004c11462bf139a873311333cbe6c26046810844199f67d6dd9d7196a7e168261013c50bcb9f24a6bdd37879f617d7aa2089d2a067cb6ca09cbaea
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_1.exeMD5
fa462c359e051adb045ab3daae96b9bf
SHA1eb98daab0e5e9dfd46c129f3c3ddc7c3b983e542
SHA2560caf0ddd249aa1f2982f11f903fd049881b62283c6e06e8d55395cf74ec62867
SHA512f2ee29fe43edfa873f5345fba72c25a98dc0d1ec51f72fa11bd1b392c4f5ee07daa2d3eab3826da2c806a89716af5f69deb1eadbcdbfa48cfcad39e487726a35
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_1.exeMD5
4c6423f9454cf6494320537f2f72ccd2
SHA12375df89d454ea2560595d60a3230e220b3b25e6
SHA2563850460030ce3506ce3b68f6e0cfbad4afb6a6b432cb199c3545bd1f42460bd4
SHA5127c0035f8e843a700416b606d3e6cac1032e81c7e7707d512c7ac44a7fbfaf14266b7c22d4e22e333773455ce86c29fe3a673f49ceeb07917e8420226eebecd76
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_2.exeMD5
18ffdaa7a2c9906db10ffc13f7c73d23
SHA1f195661bc0f9735d02fbe0e937bfd80cf0bcb11f
SHA256365bbeb36a288d829c8dc0f1bf7f70949dd10474586cfc7123c1503256b9e5c3
SHA512db1f81c5b6cac59d6e58e8ab4020bdef7386fa1aa7297f57f693334b70d3dd553ab844f85f92e9903b667cae19f30f188f84939ac0bba2f5999d5bf89793ea34
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_2.txtMD5
18ffdaa7a2c9906db10ffc13f7c73d23
SHA1f195661bc0f9735d02fbe0e937bfd80cf0bcb11f
SHA256365bbeb36a288d829c8dc0f1bf7f70949dd10474586cfc7123c1503256b9e5c3
SHA512db1f81c5b6cac59d6e58e8ab4020bdef7386fa1aa7297f57f693334b70d3dd553ab844f85f92e9903b667cae19f30f188f84939ac0bba2f5999d5bf89793ea34
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_3.exeMD5
2d4cc9861d869b08e81401012f5dea00
SHA118715c699204c69a3b73a5631081d70faa5fab55
SHA2561426c758daf05fefcf014b1e6c090a590c4a97984cde44cd878a2f1b91134601
SHA5129149ffee53486d3dcd56e880ce8e9de6add0e2cd64d68b8d0a03434b8b7c021be067c91161d0020f68c4b4cc5aa0c2e561ad3a350c30d9d5cac0fee58f597be5
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_4.exeMD5
6765fe4e4be8c4daf3763706a58f42d0
SHA1cebb504bfc3097a95d40016f01123b275c97d58c
SHA256755a4266245c52bcd0328044c8a0908b2daafbad140cee06830b991493f21f60
SHA512c6b8d328768040b31aad0441258240ce8e99a80dba028462bd03ad9d5964d4877c296f25a5a2ca59bcafe0ad75297da39352c17f3df1bb79ec091e5ace3b5d55
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_5.exeMD5
1a543482d8181d8c6974f1b58828d1a1
SHA1794fda5a981e9b633af0827d091fc4c8fac8bc3c
SHA256f05c956f4d7d8d017f73b7ac7ee20ae52a0a9c5a75982ca3cd0da836ac8d2ca1
SHA51216e03eb83aa164ed1b31909be7a91addcd6192d8f914c0912767af1eec71b852559f03ac8c75e23e1dae2527121079aaa4ad0239bba5ea9de16404a0e6fd67a9
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_5.txtMD5
3915a3e28a2cea51062025ba4e3f0092
SHA1ed6671c1042a2bfb4e32ba03fe08ccb439d62156
SHA2568f0416eaf9d57746bfcf4df2ef06e36c61b4c220e99e9a67e7dc1a06219ce4c7
SHA5128572bfe7fefb1116a644f162478a8922e23448150f8be48b9b89abf7f7c2322a7656736a6f0f676d0218c81ae5cf8f20d4c2af4b81f99885372c398db59dc19d
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_6.exeMD5
4cc30f0b65e1535a0c4fbc8091c793ea
SHA1e85ff3ba143060418b862bce9c620c4d3d474273
SHA256e2341c140053bf06c8afe7e8d878a55a4ee6fa15de64d5b4ba7513b548be6cf1
SHA512d23acb16e26897215a97d8a01a2ef18c187557981986e83fab805de5a0829b6652229a420af7b489a07ec72abc8d7a63f26302e87b7db1153984ebd129a12d5c
-
C:\Users\Admin\AppData\Local\Temp\7zS01A58104\sonia_6.txtMD5
93875db0a61283a8a8f1ce0b39cf4a56
SHA1b135025102894bf7b925da5944664c3219741502
SHA256cc72f73a89d00ac1644bb2de4f0e1f8dcaafb230e1a4048f76926a0342ebd265
SHA512ef300de1ba1e62dd65bc8bdba5412345e4c0e51f69e44bc2d5a2fa4ef6090ae3272737f8022d5659647d88cb287335091a3848798822025b1a67daec6489ba9e
-
C:\Users\Admin\AppData\Local\Temp\axhub.datMD5
67429d449202c8a47155de2d3c21f2fb
SHA16e404a9b4bd16078758c8275d91b15b61626f67a
SHA2568aab3af9ad37ba7aeda153feac0bc7d5e2910fb995597e0aaa153b23a6c7f729
SHA5122cd44839f5fce83f3548b6e9bc7e455ff64915779bb69404a0b9a5e57df5f340230188afca6cd0b39042bf67a0201389ff1a768500f42210313253b2d4dbbf6c
-
C:\Users\Admin\AppData\Local\Temp\axhub.dllMD5
204e2ea0c196dc2f2aa23b213060c613
SHA1dd6e9aa10a6d7765724d2805868a2b49a96d4f4f
SHA2568f2c1c9c1c990f1b49a58e679545de40712e0690bb3938527e1b58cdf1cdb96f
SHA512d4506a7b3f5532da10894e940d8cb86380c07c0faaf5916524c144c0c61d8047ae228e1f02339dca11810ff34afe5a2f5781434612cd237bcb310305b6022d5c
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
41638e01a415150ed5e21d3fc01b31b3
SHA19a35e5bcc17f83515ee1a70d38e0ce5df2eb9a2b
SHA256bc31dc090a7b60cd6164bb434e9b1c7573d417b0ab19aa0d24e2414d42206aed
SHA512eed8ebf27fba966b25b46e2ee1b4744b860b7781e7aa603cdfec5987a0798ad0d76ace42b4d282757ec9171d48ab54d6adef4626c7e519eeb4781e36b1b2da29
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
9ec643b4dacc6fc0dece1eea84939ac8
SHA1c584e05fdd04f91997068d84cd7f773b34943adf
SHA256b3bbd0d5b394b9d08823a341c98bda61e8ce01185eac4ceaca9f1364fb698601
SHA512765a567d07cc0dfa8e40c29f75257826872d07e45729cc61d15efbe37e492afa7fa1c9978c7df8820d53c3ad551a988cce6594013cd6919b3bc753328485aa2d
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
fd2e2ace184d3b58c7122a46e96b043c
SHA13abf7131a61f8d500a00b0f15cf65c6913855143
SHA25629f84e28fa9d5c7fadbf675f958fde83cf4a5644c9249a4785b47b37e4a44be8
SHA5126407a253948431c380c96e5493840bcd1a2ae6b00d4c33c183369fdfbe400b4406b17c18c332ce51fedea52f9341d4a495ba24efad2add0aedd140c730423bb0
-
\Users\Admin\AppData\Local\Temp\7zS01A58104\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
\Users\Admin\AppData\Local\Temp\7zS01A58104\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
\Users\Admin\AppData\Local\Temp\7zS01A58104\libstdc++-6.dllMD5
13489e943dad950efc9aa59301209c73
SHA1ec2ce83c08329156f1b5836f4f25a82ddf2043c4
SHA25673649a615fdf4f87321d6599b86bf480e4dd78b78a06b699b335ace4bd9418ab
SHA5121a6efc7db5b8ed8cd35c0280fc42df07163fc6529e4672d2057e21bc606bd78c5e4f122c70438e93ac1e61bcc347f56010fd05c86743f7ad9aa23452ca23a0f0
-
\Users\Admin\AppData\Local\Temp\CC4F.tmpMD5
6bfd15347f31c706b989602264d386e4
SHA1772b6bf159f57c070073c8e89ef6d402bee01aef
SHA2565a214e626b7683858abcffe0011b018c3ef034b62306a6c3d43d371d01f85d1c
SHA5123fa37bfe94e793dbfcd337ed1e9cc7d3d86e410c3a811bbdccb44175dd9ad1a0b5b5edf181cbe1d5388d00c0843ea8bf347b40570637303b7314b63b1ad35172
-
\Users\Admin\AppData\Local\Temp\axhub.dllMD5
204e2ea0c196dc2f2aa23b213060c613
SHA1dd6e9aa10a6d7765724d2805868a2b49a96d4f4f
SHA2568f2c1c9c1c990f1b49a58e679545de40712e0690bb3938527e1b58cdf1cdb96f
SHA512d4506a7b3f5532da10894e940d8cb86380c07c0faaf5916524c144c0c61d8047ae228e1f02339dca11810ff34afe5a2f5781434612cd237bcb310305b6022d5c
-
memory/352-156-0x0000000000000000-mapping.dmp
-
memory/508-145-0x0000000000000000-mapping.dmp
-
memory/1432-154-0x0000000000000000-mapping.dmp
-
memory/1656-155-0x0000000000000000-mapping.dmp
-
memory/2080-149-0x0000000000000000-mapping.dmp
-
memory/2084-146-0x0000000000000000-mapping.dmp
-
memory/2152-143-0x0000000000000000-mapping.dmp
-
memory/2220-163-0x0000000000000000-mapping.dmp
-
memory/2232-147-0x0000000000000000-mapping.dmp
-
memory/2576-114-0x0000000000000000-mapping.dmp
-
memory/2880-166-0x0000000002F00000-0x0000000002F02000-memory.dmpFilesize
8KB
-
memory/2880-162-0x0000000000FE0000-0x0000000000FE1000-memory.dmpFilesize
4KB
-
memory/2880-158-0x0000000000000000-mapping.dmp
-
memory/3152-142-0x0000000000000000-mapping.dmp
-
memory/4044-144-0x0000000000000000-mapping.dmp
-
memory/4048-134-0x0000000000400000-0x000000000051D000-memory.dmpFilesize
1.1MB
-
memory/4048-150-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/4048-152-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/4048-131-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4048-117-0x0000000000000000-mapping.dmp
-
memory/4048-148-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/4048-151-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/4088-141-0x0000000000000000-mapping.dmp
-
memory/4136-167-0x0000000000000000-mapping.dmp
-
memory/4220-169-0x0000000000000000-mapping.dmp
-
memory/4348-174-0x0000000000000000-mapping.dmp
-
memory/4428-180-0x00007FF756E24060-mapping.dmp