Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 08:38
Behavioral task
behavioral1
Sample
058036f22cf856674f4167a53296a7bf_JC.exe
Resource
win7-20230831-en
General
-
Target
058036f22cf856674f4167a53296a7bf_JC.exe
-
Size
439KB
-
MD5
058036f22cf856674f4167a53296a7bf
-
SHA1
bb99e0c12b6fedf7e128cb4222c603278a31520c
-
SHA256
2c695742e32b4e45aa28c317336953fcff6d55d3ad095dbd51df68e0ce84af96
-
SHA512
1da0553339bd2b385c4b183fddef7fec3aafac908f7a5afb290e039b091a34908c7dc3639b40aaee74166cd56abc4db886eb6d4cb1e65e7334f9720c627f34b3
-
SSDEEP
6144:g9XG4oXs663ypJL9fWPEmGy3AiWd3tWlRjiJEZ8yJt0TfC29qcV:gMPs663ypJ5WPyy3pWd3tWDea5t0TfHP
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Deletes itself 1 IoCs
pid Process 2152 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1296 pyavh.exe 2508 coykc.exe -
Loads dropped DLL 2 IoCs
pid Process 2064 058036f22cf856674f4167a53296a7bf_JC.exe 1296 pyavh.exe -
resource yara_rule behavioral1/memory/2064-0-0x0000000001200000-0x0000000001271000-memory.dmp upx behavioral1/files/0x000c00000001226a-4.dat upx behavioral1/files/0x000c00000001226a-9.dat upx behavioral1/memory/1296-10-0x00000000012A0000-0x0000000001311000-memory.dmp upx behavioral1/memory/2064-18-0x0000000001200000-0x0000000001271000-memory.dmp upx behavioral1/memory/1296-21-0x00000000012A0000-0x0000000001311000-memory.dmp upx behavioral1/memory/1296-28-0x00000000012A0000-0x0000000001311000-memory.dmp upx behavioral1/files/0x0004000000004ed7-27.dat upx behavioral1/files/0x0004000000004ed7-24.dat upx behavioral1/memory/2508-31-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/files/0x000c00000001226a-32.dat upx behavioral1/memory/2508-33-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2508-34-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2508-35-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2508-36-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2508-37-0x0000000000400000-0x000000000049C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe 2508 coykc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1296 2064 058036f22cf856674f4167a53296a7bf_JC.exe 28 PID 2064 wrote to memory of 1296 2064 058036f22cf856674f4167a53296a7bf_JC.exe 28 PID 2064 wrote to memory of 1296 2064 058036f22cf856674f4167a53296a7bf_JC.exe 28 PID 2064 wrote to memory of 1296 2064 058036f22cf856674f4167a53296a7bf_JC.exe 28 PID 2064 wrote to memory of 2152 2064 058036f22cf856674f4167a53296a7bf_JC.exe 29 PID 2064 wrote to memory of 2152 2064 058036f22cf856674f4167a53296a7bf_JC.exe 29 PID 2064 wrote to memory of 2152 2064 058036f22cf856674f4167a53296a7bf_JC.exe 29 PID 2064 wrote to memory of 2152 2064 058036f22cf856674f4167a53296a7bf_JC.exe 29 PID 1296 wrote to memory of 2508 1296 pyavh.exe 33 PID 1296 wrote to memory of 2508 1296 pyavh.exe 33 PID 1296 wrote to memory of 2508 1296 pyavh.exe 33 PID 1296 wrote to memory of 2508 1296 pyavh.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\058036f22cf856674f4167a53296a7bf_JC.exe"C:\Users\Admin\AppData\Local\Temp\058036f22cf856674f4167a53296a7bf_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\pyavh.exe"C:\Users\Admin\AppData\Local\Temp\pyavh.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\coykc.exe"C:\Users\Admin\AppData\Local\Temp\coykc.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282B
MD5b88e894e8f3cb0849391da552436f2fc
SHA1d96e0e690b52b8f2b7f798fd19a7961e4410cfc9
SHA2561102bb5f6b2c1de103d86cda1a857e17a908cadf1a9c7f8d70056be7e8ac633c
SHA512d53a6da7506d13a17bbfbf0c5cd40ea7e1e51fbeec1353adba0d425205719cdeca05b461c7dd5e4b9a3b9012da05727d6848937f9db7db649285bf01d8bef773
-
Filesize
282B
MD5b88e894e8f3cb0849391da552436f2fc
SHA1d96e0e690b52b8f2b7f798fd19a7961e4410cfc9
SHA2561102bb5f6b2c1de103d86cda1a857e17a908cadf1a9c7f8d70056be7e8ac633c
SHA512d53a6da7506d13a17bbfbf0c5cd40ea7e1e51fbeec1353adba0d425205719cdeca05b461c7dd5e4b9a3b9012da05727d6848937f9db7db649285bf01d8bef773
-
Filesize
164KB
MD584f997e4d53fbedcf855c1f3875fc213
SHA1875ceb4cb7bcb1b616c3f74703d4ff3d493438ed
SHA25617f3f5d3b11dfdb652a2d1c450d6fc2504a17a558dbdcdf409c990dcc8e4017a
SHA51296952191d051872cdb410b727a82574570c5d5f392c5298deca01f6e29eae7838a02cc129eee97e29352ec9b47c1d56a25bbddde00c2802d9bb3964553688cc6
-
Filesize
512B
MD5dbb2bcf089e6a02b67304c9ab2efd687
SHA13d220fc7cc3787bc51a2c1a74c8cd36141fd46e6
SHA256d9ccec47862e8d722ce5e1dea5f81f2146e6de8cd1e906ed0729fc14ab595327
SHA5127c52076254d9a8f02277b0dc1f8bcff52f7a0f7da0edb76e815abe538c1a8a170d2481c5576ec22661032fa7265241c926e0d6c080cf72446501b226b2ff09ac
-
Filesize
439KB
MD5584356d64cddcdba1fb8d3671e3ba822
SHA186aa61ec229d946fa9537c706cb83834e8f77e50
SHA2564b7249930fb3bdb0632d2ad4dc6467ebebf33dc8c57c09308dc73be7d921fc2a
SHA512d28dffce4c8d92669e8ea7da993ca02ce1112bb6aac7c73179b88a965ceb28e0b25e2d36a26bb5e2aae6b5e67bfcfa5d21c8faec7e6e3fbb02785f74cd4209a9
-
Filesize
439KB
MD5584356d64cddcdba1fb8d3671e3ba822
SHA186aa61ec229d946fa9537c706cb83834e8f77e50
SHA2564b7249930fb3bdb0632d2ad4dc6467ebebf33dc8c57c09308dc73be7d921fc2a
SHA512d28dffce4c8d92669e8ea7da993ca02ce1112bb6aac7c73179b88a965ceb28e0b25e2d36a26bb5e2aae6b5e67bfcfa5d21c8faec7e6e3fbb02785f74cd4209a9
-
Filesize
164KB
MD584f997e4d53fbedcf855c1f3875fc213
SHA1875ceb4cb7bcb1b616c3f74703d4ff3d493438ed
SHA25617f3f5d3b11dfdb652a2d1c450d6fc2504a17a558dbdcdf409c990dcc8e4017a
SHA51296952191d051872cdb410b727a82574570c5d5f392c5298deca01f6e29eae7838a02cc129eee97e29352ec9b47c1d56a25bbddde00c2802d9bb3964553688cc6
-
Filesize
439KB
MD5584356d64cddcdba1fb8d3671e3ba822
SHA186aa61ec229d946fa9537c706cb83834e8f77e50
SHA2564b7249930fb3bdb0632d2ad4dc6467ebebf33dc8c57c09308dc73be7d921fc2a
SHA512d28dffce4c8d92669e8ea7da993ca02ce1112bb6aac7c73179b88a965ceb28e0b25e2d36a26bb5e2aae6b5e67bfcfa5d21c8faec7e6e3fbb02785f74cd4209a9