Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 10:40
Behavioral task
behavioral1
Sample
c063c49b9aadc37b4bd6a746f157378c.exe
Resource
win7-20240221-en
General
-
Target
c063c49b9aadc37b4bd6a746f157378c.exe
-
Size
465KB
-
MD5
c063c49b9aadc37b4bd6a746f157378c
-
SHA1
c15c71c2b7a926886ef84104ab289ab68c3a9ebe
-
SHA256
f26c344c3e1ad437eee71c72dd28160e3a99b24af0d28c75a1aeb83bb4f94718
-
SHA512
f71263e31d4960c9950565799a32571f5d0c5beac80a0cadcd5c9b64e80953f380253c804a96cbe120484d66b23ed29eef3e4f6bf75e9633dc4ebcb1029da356
-
SSDEEP
12288:m6twjLHj/8/GcHUIdPPzEmvTnabAh0ZnAr1Uv:m6tQCG0UUPzEkTn4AC1+Q
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
Signatures
-
Deletes itself 1 IoCs
pid Process 2488 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2892 ifqoe.exe 1456 wuywi.exe -
Loads dropped DLL 2 IoCs
pid Process 2184 c063c49b9aadc37b4bd6a746f157378c.exe 2892 ifqoe.exe -
resource yara_rule behavioral1/files/0x0004000000004ed7-27.dat upx behavioral1/memory/1456-28-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/1456-30-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/1456-31-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/1456-32-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/1456-33-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/1456-34-0x0000000000400000-0x000000000049F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe 1456 wuywi.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2892 2184 c063c49b9aadc37b4bd6a746f157378c.exe 28 PID 2184 wrote to memory of 2892 2184 c063c49b9aadc37b4bd6a746f157378c.exe 28 PID 2184 wrote to memory of 2892 2184 c063c49b9aadc37b4bd6a746f157378c.exe 28 PID 2184 wrote to memory of 2892 2184 c063c49b9aadc37b4bd6a746f157378c.exe 28 PID 2184 wrote to memory of 2488 2184 c063c49b9aadc37b4bd6a746f157378c.exe 29 PID 2184 wrote to memory of 2488 2184 c063c49b9aadc37b4bd6a746f157378c.exe 29 PID 2184 wrote to memory of 2488 2184 c063c49b9aadc37b4bd6a746f157378c.exe 29 PID 2184 wrote to memory of 2488 2184 c063c49b9aadc37b4bd6a746f157378c.exe 29 PID 2892 wrote to memory of 1456 2892 ifqoe.exe 33 PID 2892 wrote to memory of 1456 2892 ifqoe.exe 33 PID 2892 wrote to memory of 1456 2892 ifqoe.exe 33 PID 2892 wrote to memory of 1456 2892 ifqoe.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c063c49b9aadc37b4bd6a746f157378c.exe"C:\Users\Admin\AppData\Local\Temp\c063c49b9aadc37b4bd6a746f157378c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\ifqoe.exe"C:\Users\Admin\AppData\Local\Temp\ifqoe.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\wuywi.exe"C:\Users\Admin\AppData\Local\Temp\wuywi.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_sannuy.bat" "2⤵
- Deletes itself
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD536499ebff821457861dd5ccb52113066
SHA1a521b160afab8e1e31647148b4b7f27d176c3c1b
SHA25621409e7d7366616b2675d50a11f206e26f71f1f36cec705da4d665b46c022790
SHA512dda3b4e0faa469e8b93187ee6ad3edfeb8af727515341b63895c46e80ff1f358216faa1f31aae7a8898883654f70f105e46a19fc926dbb1b88ed9440a01227ea
-
Filesize
512B
MD501c8f4ba58785635aefc669f15079ec3
SHA108b85fb6f271466865c6fb9480653d4179eda396
SHA2568d9a3423bfc2ccc1f4e85c56efec27b120395c3a2e73cd287e1a40822473b5ff
SHA5127a04efef9ff5b845af3546c7c7d52ae51db086ac05b3b37a79e63acdfc500d2045186145a7f4b4754c2e0cda8404c51a35befe379696f12be827c20125820104
-
Filesize
39KB
MD5a75004df14f003d9df0c7aa9a7bfc3e8
SHA1e2aaf88f6c826fff26982c8c0e12a5aae2809a4e
SHA256067efe4f2629ad6aec3fad39c87961bcea3233558a3d2c723ebe1ffe7990ee24
SHA512fcbbd0e3cc90cf72cf6c99272173ee92590ebfd848433704a238b552dd9413dc03e44b2f8f807035204ae655794e80cc871993e70d8cc9eea0c8738687102537
-
Filesize
198KB
MD5f048734e315e4abc223a161f9f8c4cbb
SHA1c7092715d394ecfebde70ce4b704fea70240ac62
SHA2561476d1fe03ebefb8e8b860d10fe7a86d505e31033a0a851362c42a8a7cc30852
SHA512052bf9bc42c8e183cfbc42b745d1f8c82ebe69fc1a30f9ae41d9677949b65e19b436a645294c35d335c0920d24de0d708b092f49c50ea421e3fcb9f70cf811ce
-
Filesize
465KB
MD58a3a1f7e8b917b3429bdf27585d505c2
SHA19a6b260efae1fd22b69eb364003bae5bc7bc90b9
SHA2567f4ee8bd2f5686d50284aca10bf7a52d322cb44fd0715f712de896aab51fcbe6
SHA51218598c9aa68ca97c7367369b3861985cffc92aa997dd86e35300703b02870c220e189ccc82721ba7abbb80e20f3a911783d1498a385ec32806abe42c512e03bc