Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 22:07
Behavioral task
behavioral1
Sample
78570dac5d98a53190bc5803a188c5cef2666c58d421bfd28547d5e6caff53af.exe
Resource
win7-20240221-en
General
-
Target
78570dac5d98a53190bc5803a188c5cef2666c58d421bfd28547d5e6caff53af.exe
-
Size
417KB
-
MD5
eafa2454b57dc341ad9acfbd60f6876c
-
SHA1
768d91ec07f7a4e636e7df1c5174f280d61f0d62
-
SHA256
78570dac5d98a53190bc5803a188c5cef2666c58d421bfd28547d5e6caff53af
-
SHA512
e5315102e22a37a44f68b6f3a904352837947567003170321133eef7d3f798825c5d1fa5246358143224e34fb476e2321e84e1331850325a65fea4c761468967
-
SSDEEP
6144:TzU7blK2P2iCWhWapKRaRXOkN4Swel6f3IsIZOmop:vU7M1ijWh0XOW4sEf4O3
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
resource yara_rule behavioral1/files/0x000f00000000f680-26.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2652 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2032 juvyh.exe 1676 zubas.exe -
Loads dropped DLL 3 IoCs
pid Process 1704 78570dac5d98a53190bc5803a188c5cef2666c58d421bfd28547d5e6caff53af.exe 1704 78570dac5d98a53190bc5803a188c5cef2666c58d421bfd28547d5e6caff53af.exe 2032 juvyh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 53 IoCs
pid Process 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe 1676 zubas.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2032 1704 78570dac5d98a53190bc5803a188c5cef2666c58d421bfd28547d5e6caff53af.exe 28 PID 1704 wrote to memory of 2032 1704 78570dac5d98a53190bc5803a188c5cef2666c58d421bfd28547d5e6caff53af.exe 28 PID 1704 wrote to memory of 2032 1704 78570dac5d98a53190bc5803a188c5cef2666c58d421bfd28547d5e6caff53af.exe 28 PID 1704 wrote to memory of 2032 1704 78570dac5d98a53190bc5803a188c5cef2666c58d421bfd28547d5e6caff53af.exe 28 PID 1704 wrote to memory of 2652 1704 78570dac5d98a53190bc5803a188c5cef2666c58d421bfd28547d5e6caff53af.exe 29 PID 1704 wrote to memory of 2652 1704 78570dac5d98a53190bc5803a188c5cef2666c58d421bfd28547d5e6caff53af.exe 29 PID 1704 wrote to memory of 2652 1704 78570dac5d98a53190bc5803a188c5cef2666c58d421bfd28547d5e6caff53af.exe 29 PID 1704 wrote to memory of 2652 1704 78570dac5d98a53190bc5803a188c5cef2666c58d421bfd28547d5e6caff53af.exe 29 PID 2032 wrote to memory of 1676 2032 juvyh.exe 33 PID 2032 wrote to memory of 1676 2032 juvyh.exe 33 PID 2032 wrote to memory of 1676 2032 juvyh.exe 33 PID 2032 wrote to memory of 1676 2032 juvyh.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\78570dac5d98a53190bc5803a188c5cef2666c58d421bfd28547d5e6caff53af.exe"C:\Users\Admin\AppData\Local\Temp\78570dac5d98a53190bc5803a188c5cef2666c58d421bfd28547d5e6caff53af.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\juvyh.exe"C:\Users\Admin\AppData\Local\Temp\juvyh.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\zubas.exe"C:\Users\Admin\AppData\Local\Temp\zubas.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5712af6a6df3dd1cf43c3f568523adcc2
SHA11a0d9f81191f657061eefa6289d71ce1cd9bc5f7
SHA256e9e386a7fab1b0a2bbb5fc81842f8d536950710be0deab1c211b8b38db0ae57a
SHA512b31d7d52b375f8fec6ddd9a23ad66a9636394fc34e59e74e2c036ff4f31972da3e10be85f008e042179e836973abb447547eddbdc3557d62aed5dd69a36ad13d
-
Filesize
512B
MD53003a82fd2dee1b68b04fecbd5289fb3
SHA1491c8f4ee465af42e022e367b45d4acf352aa2a9
SHA2560edb6dd13c0afee4dab9e692b8ad2d635683024ba28482e339e19738e29df6f9
SHA512cfc44d27cfe17cc406553c410a53f1a5b8c476980960dc82c981b007b2f64a0561bdcb19ebeeb5d83dd91f0be6bf61c186abf6f1934eb9315f741d77e252fa16
-
Filesize
417KB
MD5b92c0fe89df3e0ca21341aa28653d9d7
SHA18fdcc89ed0134e50a71a0f1ae1e76b2e1ab382d8
SHA256a3464775aa85cef4b2fd02302120236237aa0c521cb33f1b50f5b9a293cbfd53
SHA512cb2cd0f24ec9c66d2ca7260548ca99e12fea170ccecf7d6778edf41872f881c650b4fb1ce8b4e790ae3a7863e95239403963f056fa5123a36eadb8b296bef6db
-
Filesize
212KB
MD50d4d35f67ae932464f61a92f8d77b67a
SHA13ba3244ab9548252baaf62ea599e1fd4cf6e46e5
SHA256d86cc40408f1c1c32c238aee78672befca4bb3db3864f01f33b857e8fd090e1c
SHA5127f6e1d184f51f8c72008a3ca81fb5422cf0442d5d1b6e38f21cb8c564c261893ccb1687754c2066f1eba762c9edb9ce7b7b261d2e4e8fd97b0a667edb8c8f9fd