Analysis
-
max time kernel
151s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 22:37
Behavioral task
behavioral1
Sample
5363b7cc15bc76f5097a2836e8c8bc0c.exe
Resource
win7-20240221-en
General
-
Target
5363b7cc15bc76f5097a2836e8c8bc0c.exe
-
Size
412KB
-
MD5
5363b7cc15bc76f5097a2836e8c8bc0c
-
SHA1
61a82c0b1cb95e875ab06ee7a4dc08098f204a8d
-
SHA256
43d080a43009395ba1e85c202bf12804fc5ab128e79cfeeab7f359a1235a303f
-
SHA512
215235b086985dc420353ddb9a23407acd111851b05cfcd63ad7a80c15f1e6a78792fe010b11ff336b3ac2d4f87b4ae2bc132f6a20be926b4232a2f34b7b5535
-
SSDEEP
6144:GzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInODgs:oU7M5ijWh0XOW4sEfeO8s
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
resource yara_rule behavioral1/files/0x000f00000000f680-26.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2464 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1064 ceboi.exe 1488 soxod.exe -
Loads dropped DLL 3 IoCs
pid Process 2696 5363b7cc15bc76f5097a2836e8c8bc0c.exe 2696 5363b7cc15bc76f5097a2836e8c8bc0c.exe 1064 ceboi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe 1488 soxod.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2696 wrote to memory of 1064 2696 5363b7cc15bc76f5097a2836e8c8bc0c.exe 28 PID 2696 wrote to memory of 1064 2696 5363b7cc15bc76f5097a2836e8c8bc0c.exe 28 PID 2696 wrote to memory of 1064 2696 5363b7cc15bc76f5097a2836e8c8bc0c.exe 28 PID 2696 wrote to memory of 1064 2696 5363b7cc15bc76f5097a2836e8c8bc0c.exe 28 PID 2696 wrote to memory of 2464 2696 5363b7cc15bc76f5097a2836e8c8bc0c.exe 29 PID 2696 wrote to memory of 2464 2696 5363b7cc15bc76f5097a2836e8c8bc0c.exe 29 PID 2696 wrote to memory of 2464 2696 5363b7cc15bc76f5097a2836e8c8bc0c.exe 29 PID 2696 wrote to memory of 2464 2696 5363b7cc15bc76f5097a2836e8c8bc0c.exe 29 PID 1064 wrote to memory of 1488 1064 ceboi.exe 33 PID 1064 wrote to memory of 1488 1064 ceboi.exe 33 PID 1064 wrote to memory of 1488 1064 ceboi.exe 33 PID 1064 wrote to memory of 1488 1064 ceboi.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5363b7cc15bc76f5097a2836e8c8bc0c.exe"C:\Users\Admin\AppData\Local\Temp\5363b7cc15bc76f5097a2836e8c8bc0c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\ceboi.exe"C:\Users\Admin\AppData\Local\Temp\ceboi.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\soxod.exe"C:\Users\Admin\AppData\Local\Temp\soxod.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD55c8c644dd14b15c274f17148997925a7
SHA12c98525c3cf577985df0bbcbfe1e6755564a3846
SHA256a271df78c3e50b046fa7f9ead16c52238584282385052018c6348bc0a4b61588
SHA51283e2a976b1fb5b99dc130661a45d83506ea58d94ee1d07a027b904f8f3955078815dbbb1102a910261a5960f9b00193f7e317e73b5f335c68d2dba1fd8b374da
-
Filesize
512B
MD5961dbfb970de5a32fdbf660a8a1d53c3
SHA1cea2e841f68b49296149b2def0d842b56f691f51
SHA256141a0458869e26148868cf8a1cc30d383fe0cae886e60997885a40e40ef22622
SHA51210390766a5fbd37479072aee5d758e24ef79ec4ffcf7016dc0608fe584e3d5540f946edec3402e27b44d1075aea4ef906583fb07ce7bda075485c65fb1d3ecd8
-
Filesize
412KB
MD5aab040fc7f94910bdedac0e63880e3cb
SHA1d76ca4e805df0b47bc37aaaf91f00d2b1085ecf4
SHA2568eb647e6b6394ad640c8059b58ae8a556642540e9a709e391b69ae79d617e8dd
SHA51288cde7a63646dec4f536c2dcb6dcb24b1579fca65c520834a60bea7a0391a5c98f9e89bcf723f8ab6e0889309e4eb736b61b1a6385f0582799fe8ff18877c168
-
Filesize
212KB
MD5b38a83c06f16944e91054345c183fdf9
SHA1ee22941ea082f30cb2fdbb1022a5ddeb2fe3df07
SHA2568f443823e1a4ad6a9ccffb7e2e5e391ae665b5231d391c0ba4ba2a777c3c7adf
SHA5127b575e1fb450cf192b877ec9dc20ad7f7c79c91edb4b08e8127aa96971aaba20cb39ce5508946fa922dd2441165addfa99df776df11d1db189d1b246e30b81d6