Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe
Resource
win7-20231129-en
General
-
Target
8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe
-
Size
343KB
-
MD5
39d3b86f9e8cf53ae91e37b591271ea2
-
SHA1
163cfe040644500164b2ef914cef0d00ef1225e9
-
SHA256
8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21
-
SHA512
cdc41c741fe321571c06bff183db762f5b74ee06b6a00afeb1335d900c4a5fb8f052930a4c77500fe5328b912dfccd0f3a8a1fecdfd2b34862b98e1f90189f2f
-
SSDEEP
6144:SF/gEKyOAuuHcqXt96bHa+bZu0k6XCCbd2CKcwA2x9G+84AmGSncH:SF/gVyduuHv946gZ6bCbd2qspnA6g
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Detects executables built or packed with MPress PE compressor 6 IoCs
resource yara_rule behavioral1/memory/1972-0-0x0000000000400000-0x000000000048B000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0009000000016176-4.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/1972-17-0x0000000000400000-0x000000000048B000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2348-18-0x0000000000400000-0x000000000048B000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2348-21-0x0000000000400000-0x000000000048B000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2348-35-0x0000000000400000-0x000000000048B000-memory.dmp INDICATOR_EXE_Packed_MPress -
Deletes itself 1 IoCs
pid Process 2188 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2348 hyexd.exe 2500 taqiy.exe -
Loads dropped DLL 2 IoCs
pid Process 1972 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe 2348 hyexd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe 2500 taqiy.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2348 1972 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe 28 PID 1972 wrote to memory of 2348 1972 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe 28 PID 1972 wrote to memory of 2348 1972 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe 28 PID 1972 wrote to memory of 2348 1972 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe 28 PID 1972 wrote to memory of 2188 1972 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe 29 PID 1972 wrote to memory of 2188 1972 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe 29 PID 1972 wrote to memory of 2188 1972 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe 29 PID 1972 wrote to memory of 2188 1972 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe 29 PID 2348 wrote to memory of 2500 2348 hyexd.exe 33 PID 2348 wrote to memory of 2500 2348 hyexd.exe 33 PID 2348 wrote to memory of 2500 2348 hyexd.exe 33 PID 2348 wrote to memory of 2500 2348 hyexd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe"C:\Users\Admin\AppData\Local\Temp\8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\hyexd.exe"C:\Users\Admin\AppData\Local\Temp\hyexd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\taqiy.exe"C:\Users\Admin\AppData\Local\Temp\taqiy.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5b0f9901cc65a6f7a0157f6e9ab2c56d4
SHA1cb282e364211b9cd63bcff73a567863780e1833f
SHA256b94d08c89c87f6e4fb50258c652cc9bea4d95e2cdb671cefcc0be28c00d924b5
SHA5127b1fe66e76c67bc686e583d42b6a5cb8282d5ccc3f35a3668e34f4d7b7375a76e565ed2a855dc109371a0af3f38cb8176c0aee4bff302dc8bc2b61c00d616326
-
Filesize
512B
MD56ee3f98eaadfb4485455f53404e76606
SHA18090fbcaa1dba544ff25d653468886e301a70f3c
SHA2562bada7fb47baca8bc861fe2615180e7db109e657eca1e172bbebf218e0aed6e7
SHA512fd9138264b70783dd002a3f836168f08e1f7b1bc52ca50691b7be157f7f0d33d4cb9687f25ebc203d2a1044a7f84e8eade638e37e337189570ac7d1de15147a0
-
Filesize
218KB
MD5d0083f7b251a9fca40e3aee40f9587b5
SHA12328179bfef00fdc94c23a72103bd2369f53f6c2
SHA2568ac577f1fd53a275a249fdc090c472a03ee6dcb6b6a4de3bbd675c18a13aa1af
SHA512bdb9c3b62fbadb5c37cba778c79e5e43e0142f2b905e7d9ca8b68877cef443e0df91418df800e35548f7764f0bb1086498ccef1875ad683ea0a74b6bd9fec08a
-
Filesize
343KB
MD582f037f5b5542cf2ced17886c6fc713b
SHA1191ef8b96181a6946e9560e9e7d1161b84173cd3
SHA256bdc1fad1d48cf8bdf2c6c6e534352521479defd13fa71ccbaf75d6efa4f053d3
SHA51213b9515fc2ddda7b4b3ef8724cfa9d7ec6efb86b15e08d4cffb85e17c89e93c5aeba93f7b309941c5198c276d6d545ce04289e95187ede4588ed32a3227a91b8