Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6.exe
Resource
win7-20240220-en
General
-
Target
d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6.exe
-
Size
6.4MB
-
MD5
2fb94fe3b6ac58d0a8355e24dce703e6
-
SHA1
fac38ffb4b175463f90d513062d27c55507a1ef6
-
SHA256
d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6
-
SHA512
a586c6300cae01427e3bffe3d472ea4097b16c00c74e9c6899a76f568328d32f8aaa88995a669fa8e8f638b324c36cc94edd106b9d332ef9b78422d5bab5d447
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSu:i0LrA2kHKQHNk3og9unipQyOaOu
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
UPX dump on OEP (original entry point) 3 IoCs
resource yara_rule behavioral1/files/0x0012000000013f2c-161.dat UPX behavioral1/memory/2220-174-0x0000000000400000-0x0000000000599000-memory.dmp UPX behavioral1/memory/2220-181-0x0000000000400000-0x0000000000599000-memory.dmp UPX -
Deletes itself 1 IoCs
pid Process 2656 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2704 muley.exe 2792 puteve.exe 2220 bikun.exe -
Loads dropped DLL 5 IoCs
pid Process 2912 d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6.exe 2912 d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6.exe 2704 muley.exe 2704 muley.exe 2792 puteve.exe -
resource yara_rule behavioral1/files/0x0012000000013f2c-161.dat upx behavioral1/memory/2220-174-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral1/memory/2220-181-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2912 d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6.exe 2704 muley.exe 2792 puteve.exe 2220 bikun.exe 2220 bikun.exe 2220 bikun.exe 2220 bikun.exe 2220 bikun.exe 2220 bikun.exe 2220 bikun.exe 2220 bikun.exe 2220 bikun.exe 2220 bikun.exe 2220 bikun.exe 2220 bikun.exe 2220 bikun.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2704 2912 d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6.exe 28 PID 2912 wrote to memory of 2704 2912 d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6.exe 28 PID 2912 wrote to memory of 2704 2912 d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6.exe 28 PID 2912 wrote to memory of 2704 2912 d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6.exe 28 PID 2912 wrote to memory of 2656 2912 d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6.exe 29 PID 2912 wrote to memory of 2656 2912 d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6.exe 29 PID 2912 wrote to memory of 2656 2912 d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6.exe 29 PID 2912 wrote to memory of 2656 2912 d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6.exe 29 PID 2704 wrote to memory of 2792 2704 muley.exe 31 PID 2704 wrote to memory of 2792 2704 muley.exe 31 PID 2704 wrote to memory of 2792 2704 muley.exe 31 PID 2704 wrote to memory of 2792 2704 muley.exe 31 PID 2792 wrote to memory of 2220 2792 puteve.exe 34 PID 2792 wrote to memory of 2220 2792 puteve.exe 34 PID 2792 wrote to memory of 2220 2792 puteve.exe 34 PID 2792 wrote to memory of 2220 2792 puteve.exe 34 PID 2792 wrote to memory of 1112 2792 puteve.exe 35 PID 2792 wrote to memory of 1112 2792 puteve.exe 35 PID 2792 wrote to memory of 1112 2792 puteve.exe 35 PID 2792 wrote to memory of 1112 2792 puteve.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6.exe"C:\Users\Admin\AppData\Local\Temp\d276a8b8f347e8ae29beebd93f3dcbb0fd4215e0e6045e13f247b7ad78beafe6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\muley.exe"C:\Users\Admin\AppData\Local\Temp\muley.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\puteve.exe"C:\Users\Admin\AppData\Local\Temp\puteve.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\bikun.exe"C:\Users\Admin\AppData\Local\Temp\bikun.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:1112
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD501334a8e7c56071c959dae74c53e822e
SHA1b5c4bf03cd24038dd14c37ab00d54f0f863bae0d
SHA256702923818e0338658bab3b99f0be895e205920b3f9af1be3e0661e5f6174bf08
SHA512ed42c0938cb802b87769eb56dace82996d1bdff1c2bb945c741ad1ba1d6a3f4e4ef5c619f8f64f816f9d761423c8ea987b4faa7c03e2f35fdae0849345d64129
-
Filesize
340B
MD5f8ec7d8cd0c79c803d601205b3282e5a
SHA12b3cabb088b0a3bdf57de4242ba5f2004b714c5e
SHA25624f3405d02cfea82bc17b134e93d9d0c01cd3356cbc63bf0bb7e9b6e3b21a829
SHA512612996e87ef258f76215f5b6f06752f0a8d29153ce0543efbcf1e95b4fab3eb31b46c88b9df1f245bf7d6c7a59303ff93d1b234a1520479b27d5e330952debb3
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD56de62bcaafbf1246a40a3c0465ea92a0
SHA1b46e68c161be01740c782c28eb49abb97ce40605
SHA256f190423355d86b71fe0d6715c05b41fbfcca3d479e7d2ac2985aa30aa2f9b3a7
SHA5124c101b9a48f1d488d649e3d9052a589dc63dc2716d19ea676347b6ddc174af328eb31f82e92afc466f93b2902a3b6499351f914060778efb8a1587ef018e631b
-
Filesize
459KB
MD5114f8c2d124f7d46f9a2aa7036954c2e
SHA12b947318e7fe578d65ce4f5c003229366e3ddbd2
SHA256b62c60e1be69ace46574b007ec822aabc7fd868a541fb0b18ce4f7989d2e0ede
SHA512ac04e06d67bfb7233198ba0e80340699c8245c4c2565dbded72acfe4bd065862071e396fc8fe18081a242db2b92a54fa2b32ceff37cf5e458ea5b508851c58e7
-
Filesize
6.4MB
MD513bdc14bc9a730947fe5ca29368586ee
SHA16905826875e5d89947f1b0b1f84d312761802702
SHA2562e7e7cc35bcf3aa643ce36c03c643ef2fe1ab5afc7507a8373b7d4ecc2bcc325
SHA512291f1677bd83bf4ed80fcae11295d2496595f130645df06c974cb43d4913c6158169ca2b3986ddb0acc97f25512c5f96a4850cb44d58af090b3fc75740c14b04