Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe
Resource
win7-20240215-en
General
-
Target
88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe
-
Size
348KB
-
MD5
4c4b66c6b066b8edb66c349622eafa64
-
SHA1
a52526caa56039bd166e3b411d1e2cd91468a467
-
SHA256
88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91
-
SHA512
b2303535b7207ec167c8d3ebda7d010ac0346e73bfbf042cf916e3d07249e84bca4f5d1fc1cd056446ddbf601144cc000654712bbb837ec8f3eb130b73ff6d0f
-
SSDEEP
6144:SaVKyyzwbnUkoiqwcAR92+TdO5CksxCDy9pPbzBHU2ytluF5:g7yUTihR3ONs46pP3BHUbtg
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Deletes itself 1 IoCs
pid Process 2084 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2428 kadig.exe -
Loads dropped DLL 1 IoCs
pid Process 2328 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2428 2328 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe 28 PID 2328 wrote to memory of 2428 2328 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe 28 PID 2328 wrote to memory of 2428 2328 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe 28 PID 2328 wrote to memory of 2428 2328 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe 28 PID 2328 wrote to memory of 2084 2328 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe 29 PID 2328 wrote to memory of 2084 2328 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe 29 PID 2328 wrote to memory of 2084 2328 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe 29 PID 2328 wrote to memory of 2084 2328 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe"C:\Users\Admin\AppData\Local\Temp\88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\kadig.exe"C:\Users\Admin\AppData\Local\Temp\kadig.exe"2⤵
- Executes dropped EXE
PID:2428
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5113cdc98c8047fda62939eb3ad47f51c
SHA170751cc92e0601db54ed1a9aacb61afc3610d5f4
SHA2562f96c0204a00a5f08f08fa25b35670633fb3a8a56f0ff58ee036de5c20678902
SHA512989ae6cefb3b50b06ef8c6e004e1da56cacc637f0d2e2ca24bba9605d61659c1977a89dd26a115709155a5645dbfb28e05d2a3f21fde817a15bbf86876d24dde
-
Filesize
512B
MD5766e808afaaa649d27667400d5c1f065
SHA1c31f9e4b9e8e5a4840107f44d42cdaddb568a1b6
SHA25669909994f90b457f255239b2b0e002b97ae5275c8d5324b60fe2a197581c49eb
SHA512cab6551aba387713e4748515e5806692691b703eaf89a79ee13fb72fad450d38ff3eb5d58be182a593ef8307c86037c72d5275053cc86746f43fc5d171a02821
-
Filesize
348KB
MD50d46368e807bf1486d3fcd839e903fe2
SHA1824027cc7e26c6665fb1455d950771cd095aed77
SHA256dc28131977505aa3fd1d2a649ad73851b65a879992022d92b05a4714cec72bed
SHA512561b2f21fd3044d8fc16170565ec4dc2775ae292f71c294cde37042d4c13b2a04d9df787bd42b73be60e41dc1101c8505377ea0e316eea2eebd8b5db588debb8