Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 09:41
Behavioral task
behavioral1
Sample
b4624632352899f5b1dde2aac8902e00.exe
Resource
win7-20240215-en
General
-
Target
b4624632352899f5b1dde2aac8902e00.exe
-
Size
235KB
-
MD5
b4624632352899f5b1dde2aac8902e00
-
SHA1
07ee4519a65231da6cf5ce5673eac51cd04ea1ac
-
SHA256
ae130229b99f6c1e716bce2186d6a269bf9f6abbdb42c040ed0b9f910e65521f
-
SHA512
1cedfa8b4775d20bca40cb266eb93a7a7aa1e925b402bd16d5ebb37e71b1ebe35e3cbafb63943837189ddbb51b3161cabfe15b7a6f1be694f4a4a992ac97f834
-
SSDEEP
3072:K8ASpvo0LKrXEX65ezpxJ2kbJ7mv73E2o/9sY2b:ZASpvo0LKkRzpxJ2kRqroib
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Deletes itself 1 IoCs
pid Process 2484 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2908 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 2896 b4624632352899f5b1dde2aac8902e00.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2908 2896 b4624632352899f5b1dde2aac8902e00.exe 28 PID 2896 wrote to memory of 2908 2896 b4624632352899f5b1dde2aac8902e00.exe 28 PID 2896 wrote to memory of 2908 2896 b4624632352899f5b1dde2aac8902e00.exe 28 PID 2896 wrote to memory of 2908 2896 b4624632352899f5b1dde2aac8902e00.exe 28 PID 2896 wrote to memory of 2484 2896 b4624632352899f5b1dde2aac8902e00.exe 29 PID 2896 wrote to memory of 2484 2896 b4624632352899f5b1dde2aac8902e00.exe 29 PID 2896 wrote to memory of 2484 2896 b4624632352899f5b1dde2aac8902e00.exe 29 PID 2896 wrote to memory of 2484 2896 b4624632352899f5b1dde2aac8902e00.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4624632352899f5b1dde2aac8902e00.exe"C:\Users\Admin\AppData\Local\Temp\b4624632352899f5b1dde2aac8902e00.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
PID:2908
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD57295fb9368a0ef278de4b9755bf9fa1b
SHA1db5fa220d77ed7824ae0a4f822e0ce46010a5d77
SHA256dd259fcdbf04aa773ede7515d6a83e5b112ed3d9eef4632cf856771bfeaafd98
SHA512dd1a996311188c0baa54097fc7023f13e71115265fadb9dfa35f2a8d9df8aed1e37bd00ef612577d2eb63ba1b612a7b16a765ebfce3b7c9e7efebe54890eb88a
-
Filesize
274B
MD50c74e8951fcf496750c60c46d884d5b9
SHA12ee048d8dd7883f90dd572848f93e5f5f6e031e0
SHA25668d4d439e8a86141e109ec8c534bd437d28d1b23fb14a19ba8adc6415dc599dd
SHA5127454c4a448cff6206a20af18b47e00737fcd2d8cb2bae8b12461ddf3f462d765537d492e0b4ef5d5570ab177ffda4a405e819ac0dcb64b843221ad84854b9f01
-
Filesize
235KB
MD5b4624632352899f5b1dde2aac8902e00
SHA107ee4519a65231da6cf5ce5673eac51cd04ea1ac
SHA256ae130229b99f6c1e716bce2186d6a269bf9f6abbdb42c040ed0b9f910e65521f
SHA5121cedfa8b4775d20bca40cb266eb93a7a7aa1e925b402bd16d5ebb37e71b1ebe35e3cbafb63943837189ddbb51b3161cabfe15b7a6f1be694f4a4a992ac97f834