Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 17:22
Behavioral task
behavioral1
Sample
0830f9852bb1d63ab5a7fad0a824cbdf24273351cbac12be1568b3d9e1ee4fcf.exe
Resource
win7-20240220-en
General
-
Target
0830f9852bb1d63ab5a7fad0a824cbdf24273351cbac12be1568b3d9e1ee4fcf.exe
-
Size
420KB
-
MD5
0a2740f8770c5b39eaddf1de5f72305c
-
SHA1
4d79fae3129e777edb0423e2162a43cd50452fc6
-
SHA256
0830f9852bb1d63ab5a7fad0a824cbdf24273351cbac12be1568b3d9e1ee4fcf
-
SHA512
8375940eba553d11e4725d2ba2d7e929c0208a16c413b71cd026898ee9eaaa30635cbbebf3a49d598348f4f257fc75a1cb18990b282cdbdabb2ee84e3ea9a7b8
-
SSDEEP
6144:UzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInODGa:uU7M5ijWh0XOW4sEfeOj
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
resource yara_rule behavioral1/files/0x0004000000004ed7-26.dat aspack_v212_v242 behavioral1/files/0x0004000000004ed7-29.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2916 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2888 legoo.exe 1980 rocod.exe -
Loads dropped DLL 3 IoCs
pid Process 2064 0830f9852bb1d63ab5a7fad0a824cbdf24273351cbac12be1568b3d9e1ee4fcf.exe 2064 0830f9852bb1d63ab5a7fad0a824cbdf24273351cbac12be1568b3d9e1ee4fcf.exe 2888 legoo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe 1980 rocod.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2888 2064 0830f9852bb1d63ab5a7fad0a824cbdf24273351cbac12be1568b3d9e1ee4fcf.exe 28 PID 2064 wrote to memory of 2888 2064 0830f9852bb1d63ab5a7fad0a824cbdf24273351cbac12be1568b3d9e1ee4fcf.exe 28 PID 2064 wrote to memory of 2888 2064 0830f9852bb1d63ab5a7fad0a824cbdf24273351cbac12be1568b3d9e1ee4fcf.exe 28 PID 2064 wrote to memory of 2888 2064 0830f9852bb1d63ab5a7fad0a824cbdf24273351cbac12be1568b3d9e1ee4fcf.exe 28 PID 2064 wrote to memory of 2916 2064 0830f9852bb1d63ab5a7fad0a824cbdf24273351cbac12be1568b3d9e1ee4fcf.exe 29 PID 2064 wrote to memory of 2916 2064 0830f9852bb1d63ab5a7fad0a824cbdf24273351cbac12be1568b3d9e1ee4fcf.exe 29 PID 2064 wrote to memory of 2916 2064 0830f9852bb1d63ab5a7fad0a824cbdf24273351cbac12be1568b3d9e1ee4fcf.exe 29 PID 2064 wrote to memory of 2916 2064 0830f9852bb1d63ab5a7fad0a824cbdf24273351cbac12be1568b3d9e1ee4fcf.exe 29 PID 2888 wrote to memory of 1980 2888 legoo.exe 33 PID 2888 wrote to memory of 1980 2888 legoo.exe 33 PID 2888 wrote to memory of 1980 2888 legoo.exe 33 PID 2888 wrote to memory of 1980 2888 legoo.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0830f9852bb1d63ab5a7fad0a824cbdf24273351cbac12be1568b3d9e1ee4fcf.exe"C:\Users\Admin\AppData\Local\Temp\0830f9852bb1d63ab5a7fad0a824cbdf24273351cbac12be1568b3d9e1ee4fcf.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\legoo.exe"C:\Users\Admin\AppData\Local\Temp\legoo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\rocod.exe"C:\Users\Admin\AppData\Local\Temp\rocod.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5478650ee80c3972e2f1bcc90d6cd89e7
SHA102b3d0e82ea7fc6fec7fe494649930497863e904
SHA25668957b007f3f7b975f3ff063e9be76a49facd3acfc344b5a9e9e4583c9add9bc
SHA512a67cf84b115bb80b747c68a9452742bef0c61b3b5d5cbe484976878e449d3145024994e67e4bdfe0ecaf4ad2d6726438a8810ad3dfd65f47e30e025dff189b9f
-
Filesize
512B
MD5bd00d68c6c8d0575164e6e2384d7ae02
SHA1a5859be93e250ae6ea78723a0fdaf2fbf3a3e551
SHA2566dc22afee35eb079de6f7f756c6f3ad0559a9ce056bdfa8800e0bee3052f6839
SHA512ede9ee8bca7d8eaba92fcea459d79fc71d7f3b517f1b3f9246a14490c4463f585b099baa6e2fd3aae8c9d40f30ec268105a5af8817f6f47c63ccd511f3563aee
-
Filesize
192KB
MD5d16d0715e81cfcfe0cdcbbf7f621064d
SHA1336dd07ab3bafad8e30957c85d9a2536bdd40a8c
SHA256f6b88502cb21b5ec8aef7f6d13a6788d629d0012b93e4d91f94d567442946bfa
SHA5129040fcbe22dcd48ca7c673f258e210108b28ac99ae8dc37b87a57bf03f106c5f46a733688ec86b48d240d58ef25da070622aef8de24f7b7761cffc381948e323
-
Filesize
420KB
MD537821c122a8efe7e9bb9234e4e5568b8
SHA183e64f5d04523488c64da52486bb5eff1a382974
SHA256a2ee99da90fc1ce043b73bb22ea6fff39944df3cb540e1ac434dd2da3ec4d455
SHA512bec718583a61b883cb1b614386cf2f9e734b0dee6ae1dc8b28040fa39c60fd198ee80e330cc9835f9c5fc65bfcac4bbf45d5bc8c2f1b597d7b3491f1401fd453
-
Filesize
212KB
MD5a02df947123009ddf13ee4a9e6302704
SHA1e92def64f08eecd262364f62d8f415e9ec8e82f1
SHA256c08582c367254fbf6fa08924a8c9781a8a6729049bd882134fc48abc818029e3
SHA5125d35cc033353cc0b363a16a13037befeeb2ad45be865c0454ce8c0fa39797efcb51f66fa723ea14d60fa9281f654f643d5d24e46f8078a7e4cb6a3bca57ee14c