Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
064550e5e497d204364bca7e5f6e385b213cd14c8609f2eb3d25bb0ae58764d6.exe
Resource
win7-20231129-en
General
-
Target
064550e5e497d204364bca7e5f6e385b213cd14c8609f2eb3d25bb0ae58764d6.exe
-
Size
96KB
-
MD5
055a10c26ed741ddd588841a7764b644
-
SHA1
975552ccfc6fa602ab7c6125806a9a784167fe36
-
SHA256
064550e5e497d204364bca7e5f6e385b213cd14c8609f2eb3d25bb0ae58764d6
-
SHA512
45423e44995d7a2e9610d2ed0ad56193e939cb81360678755e9186c3b8e4c999b34978918c4afdb8bd06d86d3c8c6fbcbcce5b5b483febaf6ccfce31bf47be45
-
SSDEEP
1536:mOyB1D+5nK6FVGFHN5yzB4ZefwlQsOmr2U+hd:mPv+5nbF8NwVouwMnX
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Deletes itself 1 IoCs
pid Process 2092 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2996 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 2392 064550e5e497d204364bca7e5f6e385b213cd14c8609f2eb3d25bb0ae58764d6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2996 2392 064550e5e497d204364bca7e5f6e385b213cd14c8609f2eb3d25bb0ae58764d6.exe 28 PID 2392 wrote to memory of 2996 2392 064550e5e497d204364bca7e5f6e385b213cd14c8609f2eb3d25bb0ae58764d6.exe 28 PID 2392 wrote to memory of 2996 2392 064550e5e497d204364bca7e5f6e385b213cd14c8609f2eb3d25bb0ae58764d6.exe 28 PID 2392 wrote to memory of 2996 2392 064550e5e497d204364bca7e5f6e385b213cd14c8609f2eb3d25bb0ae58764d6.exe 28 PID 2392 wrote to memory of 2092 2392 064550e5e497d204364bca7e5f6e385b213cd14c8609f2eb3d25bb0ae58764d6.exe 29 PID 2392 wrote to memory of 2092 2392 064550e5e497d204364bca7e5f6e385b213cd14c8609f2eb3d25bb0ae58764d6.exe 29 PID 2392 wrote to memory of 2092 2392 064550e5e497d204364bca7e5f6e385b213cd14c8609f2eb3d25bb0ae58764d6.exe 29 PID 2392 wrote to memory of 2092 2392 064550e5e497d204364bca7e5f6e385b213cd14c8609f2eb3d25bb0ae58764d6.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\064550e5e497d204364bca7e5f6e385b213cd14c8609f2eb3d25bb0ae58764d6.exe"C:\Users\Admin\AppData\Local\Temp\064550e5e497d204364bca7e5f6e385b213cd14c8609f2eb3d25bb0ae58764d6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
PID:2996
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD58ef729b9fd84e7cfa197cf9032304b05
SHA19d1adeae2d5fe4c825058839466ff6a498960dae
SHA256060924129c632fd43d3bdff8f6684f85e42d2c5369a3aadc9c24a6300bbb166a
SHA5122d7ddd088e658cb0f21f284ad30390ac053aeff20dcf541aa891f50c0fe6276af54349bbdf31fcfe4d34125814011335040469fe21513f11750e2c4b9f855e3d
-
Filesize
338B
MD5aea192f4f3cfb470c28fc8c69a255bad
SHA1051f3b1532f1d8a5d383200441944d672fa770b4
SHA25641e7295856766595efd1baa9c9ba7c93d0b59231271c0d513754222ec73900dd
SHA512d3929db768b9676aef96ed192e4b5d162dbda8f8b00472d067eb2e35a717722f0c968cdb2d4c65ecb129e55c91372202849d71e3328a2ab24b461fab18bf2f31
-
Filesize
96KB
MD5084291c2aee063defd27820e7b174d00
SHA18e8f1c43ac0dae91b0c8cd58d85cf643b9a1a158
SHA25695ccd1454fa0767acaab8f5800f8972dc50788f7696e82d309af928c609dd540
SHA512db0ed43790ffdc976f2e1c7cf033c111045557fee9ecfe1f1e2b8cee46b82c8e1a4c9cefa7e50c26c565bbafccb11b19118c9732e90445c5c66cd11e3d597e12