Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 03:15
Behavioral task
behavioral1
Sample
d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe
Resource
win7-20240221-en
General
-
Target
d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe
-
Size
234KB
-
MD5
e0b44d97a6ad7f788e6d23ebcdd0b4a6
-
SHA1
e1cfab504d60b9d43c176b7ceb4ce977f8673025
-
SHA256
d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50
-
SHA512
f29bc9dfffdbdc0c95cefe52dca52f513f403faa85e37f1e6cb2b52718e60a115aa2500d1c5514da93da0f588bac3f7af38e4f8b10f3203268c74479c41530ac
-
SSDEEP
3072:Adrb8W+tGKqLDphy9q65kOVp4lwlq1/9l53GdeItG+XNcX1Mg:A1QW+tGFLVRXOVuwlqpAN4lMg
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Deletes itself 1 IoCs
pid Process 2608 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2468 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 1692 d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2468 1692 d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe 28 PID 1692 wrote to memory of 2468 1692 d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe 28 PID 1692 wrote to memory of 2468 1692 d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe 28 PID 1692 wrote to memory of 2468 1692 d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe 28 PID 1692 wrote to memory of 2608 1692 d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe 29 PID 1692 wrote to memory of 2608 1692 d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe 29 PID 1692 wrote to memory of 2608 1692 d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe 29 PID 1692 wrote to memory of 2608 1692 d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe"C:\Users\Admin\AppData\Local\Temp\d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
PID:2468
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD538df3cee9628e806ae028a55840b216e
SHA1bd1faa7e39dbf5f8d7a8749e81a45edb29998d2d
SHA256778e377beba133790823de61cffba536573321eb8c2a432f570647af685a868a
SHA512d6648c439438bcb9e0080bd5a07483d4b05d5e81d69b09b5eb46e6422fc8b86c08fc5f5e9d169d54f26becacfdc43ef4609c22aa9b3dc19b472a8368c0913feb
-
Filesize
338B
MD5e4e71c45bcdc238b4c50e93ccbd33a60
SHA1f850d279115f8a24e538468704dfe72378d4fb79
SHA25655c3cb49b676c4d0013f35fa92819afdb5b714053b1a572e1c9143a7ca914f40
SHA512374e5d256f0345dedc2be45b61424c1185997fc5a80d02887248555a3ad705afbbf2f5a4c57844253931e9ac5ff0f5c6bf1b934f1cb66c5c43a35132dfd85973
-
Filesize
234KB
MD53813645d3d483c1eb08758b92a9f2128
SHA1be9d650f3be89cf9a5d1dfb7364a7fa90bd1cb84
SHA2564ae26fa0ee604b3d8aa253a4a3f486f2e44a8a6350d1f0daa0508a7e29cc2506
SHA512f60e594893f0ba4f725163f2192b0fa0b2a67fed7291491bcb25c3489f35e7f47d0162deb8e6718efe9a9ff37b448df7db66bbf727045d70ec8136f7df61f366