Analysis
-
max time kernel
131s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 15:15
Behavioral task
behavioral1
Sample
c5d0b55930807ca01e358f4d9b86d315.exe
Resource
win7-20231215-en
General
-
Target
c5d0b55930807ca01e358f4d9b86d315.exe
-
Size
449KB
-
MD5
c5d0b55930807ca01e358f4d9b86d315
-
SHA1
4e3349ef3d5dd7e0504e2b15853850aa0c1759e0
-
SHA256
f8b425089506521645583c6720cf3498d91e09c0669640a88a0d1b1355a98d8b
-
SHA512
03adb2442eb1274d7a532be6de38eba02396e297fbd939c92124f39f25011a5d990f8a190fddd0874e76f2f7ad5f16bb88ac9562c0232748170d6ca163093f38
-
SSDEEP
6144:PEK25f5ySIcWLsxIIW4DYM6SB6v+qLnAzYmhwrxcvkzmSOpzW:PMpASIcWYx2U6hAJQnL
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2948 ofymj.exe 2592 ojazoc.exe -
Loads dropped DLL 2 IoCs
pid Process 2736 c5d0b55930807ca01e358f4d9b86d315.exe 2948 ofymj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2948 2736 c5d0b55930807ca01e358f4d9b86d315.exe 20 PID 2736 wrote to memory of 2948 2736 c5d0b55930807ca01e358f4d9b86d315.exe 20 PID 2736 wrote to memory of 2948 2736 c5d0b55930807ca01e358f4d9b86d315.exe 20 PID 2736 wrote to memory of 2948 2736 c5d0b55930807ca01e358f4d9b86d315.exe 20 PID 2736 wrote to memory of 2752 2736 c5d0b55930807ca01e358f4d9b86d315.exe 19 PID 2736 wrote to memory of 2752 2736 c5d0b55930807ca01e358f4d9b86d315.exe 19 PID 2736 wrote to memory of 2752 2736 c5d0b55930807ca01e358f4d9b86d315.exe 19 PID 2736 wrote to memory of 2752 2736 c5d0b55930807ca01e358f4d9b86d315.exe 19 PID 2948 wrote to memory of 2592 2948 ofymj.exe 17 PID 2948 wrote to memory of 2592 2948 ofymj.exe 17 PID 2948 wrote to memory of 2592 2948 ofymj.exe 17 PID 2948 wrote to memory of 2592 2948 ofymj.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5d0b55930807ca01e358f4d9b86d315.exe"C:\Users\Admin\AppData\Local\Temp\c5d0b55930807ca01e358f4d9b86d315.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\ofymj.exe"C:\Users\Admin\AppData\Local\Temp\ofymj.exe" hi2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\ojazoc.exe"C:\Users\Admin\AppData\Local\Temp\ojazoc.exe" OK1⤵
- Executes dropped EXE
PID:2592 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:320
-
-
C:\Users\Admin\AppData\Local\Temp\ciimu.exe"C:\Users\Admin\AppData\Local\Temp\ciimu.exe"2⤵PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5a665ee1f9c28fe33a886b74924dfbe99
SHA1186aa0b66db8b250d1ae0d98222ffaaf70f8d8d5
SHA256e36228b1fe0926c1df77a8360097e0abe8985bffe169c8c3637a20abc82ea683
SHA51292878c3e135c8b51e2bd08652820cc09393e53c0258544a0f140cfad028444fe3ad878c917cf9f53237f273b5291bfb5de1470abbbd6d61e32204470f7b91434
-
Filesize
23KB
MD513a6d079bfae61bf11885d2da86c7c66
SHA12f31ba35f979095ab22cf2f452c686d1c8c9287f
SHA2566ff1a3a7f6602015ba07d1b1f18c5f51b164638c0d96ac1ff08f91c5b6290f0a
SHA5125128481f37a5ab731f7fe29be0386fadf899c272b882af4b4c284c9532cde6d0620b7fc2981d2baea75d3eae94161a1395e09b4dd4f1796152a487b321aed85a