Analysis
-
max time kernel
0s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 16:53
Behavioral task
behavioral1
Sample
cad9fd9cbb6118db912f4465eb3fa786.exe
Resource
win7-20231129-en
General
-
Target
cad9fd9cbb6118db912f4465eb3fa786.exe
-
Size
444KB
-
MD5
cad9fd9cbb6118db912f4465eb3fa786
-
SHA1
aaa46a59b9a73766ba461c7f2d00cfbbdb563925
-
SHA256
c048f581df7a53413f2abb679a44d7f2e93a703c0c5c5cc3b037c1daac7ec74d
-
SHA512
50d7fa156afe16c03b59776d5b163dd0349abe9de9127195a75943cfd3b3cf58eb413bda0406f3e23610d9ae6133108a26690f6ada3ba0cf584d5051ea884d01
-
SSDEEP
6144:oEK25f5ySIcWLsxIIW4DYM6SB6v+qLnAzYmhwrxcvkzmSOpjdOx:oMpASIcWYx2U6hAJQnMU
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2268 vasoq.exe -
Loads dropped DLL 1 IoCs
pid Process 1364 cad9fd9cbb6118db912f4465eb3fa786.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2268 1364 cad9fd9cbb6118db912f4465eb3fa786.exe 17 PID 1364 wrote to memory of 2268 1364 cad9fd9cbb6118db912f4465eb3fa786.exe 17 PID 1364 wrote to memory of 2268 1364 cad9fd9cbb6118db912f4465eb3fa786.exe 17 PID 1364 wrote to memory of 2268 1364 cad9fd9cbb6118db912f4465eb3fa786.exe 17 PID 1364 wrote to memory of 2916 1364 cad9fd9cbb6118db912f4465eb3fa786.exe 16 PID 1364 wrote to memory of 2916 1364 cad9fd9cbb6118db912f4465eb3fa786.exe 16 PID 1364 wrote to memory of 2916 1364 cad9fd9cbb6118db912f4465eb3fa786.exe 16 PID 1364 wrote to memory of 2916 1364 cad9fd9cbb6118db912f4465eb3fa786.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\dosoci.exe"C:\Users\Admin\AppData\Local\Temp\dosoci.exe" OK1⤵PID:2632
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\corot.exe"C:\Users\Admin\AppData\Local\Temp\corot.exe"2⤵PID:1908
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "1⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\vasoq.exe"C:\Users\Admin\AppData\Local\Temp\vasoq.exe" hi1⤵
- Executes dropped EXE
PID:2268
-
C:\Users\Admin\AppData\Local\Temp\cad9fd9cbb6118db912f4465eb3fa786.exe"C:\Users\Admin\AppData\Local\Temp\cad9fd9cbb6118db912f4465eb3fa786.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD5ed9841bb4a7bdefda4714e624a210f47
SHA1c704cfecd0aa08a038caf1a9ec0638cbe5b960e5
SHA256f68851c05167f2adfeac68d95d544575c2aa003588eb402c255642210eedc978
SHA512571818acf1a5eaddf9bc9fa040d05cf0472936b8b0aefd8a37fa426f1434dae57d6694a17c4131b76be8586e6dada139c10ab7a0f0c2aad7935316b38d711f60
-
Filesize
512B
MD5a7396c6864e4707a9ab4811dd10f3a72
SHA176fb3baefd05ebc7c5658f4f57c3b43a7418bd59
SHA25663f6a78d5cbbf0b0268c8bd2329092bde38632fd94142fec87ed29f4d8684263
SHA51282e06adeca72c27dbe0844f947dd413c1e9c3c231efab4c719c93b21f49d8476648920358409435ad9006b10f093d7d7e3bf2614b87f0150166c0752a10373d7
-
Filesize
92KB
MD5fa3f92547d2c27f83df83ea97e4578b9
SHA182f45a70224240b1908bc168ee2e1e0da64151fb
SHA256778099f6a556cf87a008a71e032659a6f72b6d753b974166047e1e83be63c874
SHA5125815875930ad14c321336841c93f25ccd15a7efd8848d1416d34246f1fb66845830ee132a8184cb535b9b0ac134a88dc14dc8243f3bc35e317a4787cd965d49f
-
Filesize
444KB
MD507ff26c9d25a0a0f030665e62c6c4163
SHA14e670f280b44df21b7b91bad9c8c64e93fcf0f4d
SHA2569ad646e9ed5c29a66cb7659c4c1e5fbe5ff038e0a38b3fdcd30772d1b41031d5
SHA512d2873e26ba306251cf50aaa729993947bf5a2afce7af73635ee632e668baeeda36ecf96dd4719b846d3b84b8e71d7a8a60b45bdf4a18a11f7f6f042c419e169e