Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-04-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
FieroHack.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
FieroHack.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
#/LoadeSirus.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
#/LoadeSirus.exe
Resource
win10v2004-20240412-en
General
-
Target
FieroHack.exe
-
Size
676.2MB
-
MD5
76a3bd6e846f46f5e8b6c7b2f0d29c57
-
SHA1
cb78a890bdfdb2f499e3d734f9caa0153bf9add0
-
SHA256
d41b139970b0bab5449bc61bf9d79cd0287e04a7267d19df87dc7b295718cdcf
-
SHA512
791f68758768373950df5e4dc77385e1f84fa0ac001846b5d4baeb7e330a03bc1b62048c17cfe5f2818b5b8fc06ab5b9c7d3e3b856498be7f11c05db2dd4bf6d
-
SSDEEP
196608:OY9faXEN+pIePaH5Yl38xc0l6zedTuSkM0da2o:OY+EN+KeyHm6B6z4TuSk5M2o
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Sirus.exeLoadeSirus.exepid process 2548 Sirus.exe 2256 LoadeSirus.exe -
Loads dropped DLL 7 IoCs
Processes:
FieroHack.exeWerFault.exepid process 3012 FieroHack.exe 3012 FieroHack.exe 3012 FieroHack.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Sirus.exepid process 2548 Sirus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2580 2256 WerFault.exe LoadeSirus.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Sirus.exepid process 2548 Sirus.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
FieroHack.exeLoadeSirus.exedescription pid process target process PID 3012 wrote to memory of 2548 3012 FieroHack.exe Sirus.exe PID 3012 wrote to memory of 2548 3012 FieroHack.exe Sirus.exe PID 3012 wrote to memory of 2548 3012 FieroHack.exe Sirus.exe PID 3012 wrote to memory of 2548 3012 FieroHack.exe Sirus.exe PID 3012 wrote to memory of 2256 3012 FieroHack.exe LoadeSirus.exe PID 3012 wrote to memory of 2256 3012 FieroHack.exe LoadeSirus.exe PID 3012 wrote to memory of 2256 3012 FieroHack.exe LoadeSirus.exe PID 3012 wrote to memory of 2256 3012 FieroHack.exe LoadeSirus.exe PID 2256 wrote to memory of 2580 2256 LoadeSirus.exe WerFault.exe PID 2256 wrote to memory of 2580 2256 LoadeSirus.exe WerFault.exe PID 2256 wrote to memory of 2580 2256 LoadeSirus.exe WerFault.exe PID 2256 wrote to memory of 2580 2256 LoadeSirus.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FieroHack.exe"C:\Users\Admin\AppData\Local\Temp\FieroHack.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Roaming\Sirus.exeC:\Users\Admin\AppData\Roaming\Sirus.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Users\Admin\AppData\Roaming\LoadeSirus.exeC:\Users\Admin\AppData\Roaming\LoadeSirus.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 483⤵
- Loads dropped DLL
- Program crash
PID:2580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221.9MB
MD5ca04ca9362cb25e2da9e13c264e48412
SHA1510bb1042c5e07634d2ad30ea4f3c05d3c5cb760
SHA256310c10fb8b5e02c83dd21081f6f9484658a6e7b82012bd8bef5a56afb6ce427d
SHA5121bd35b1e1fd567a13fdcacb728318f1e02bf401024553b5beb91a3f794837744495b43c196ea27f1075a2058e69c9344afd9ad0ea695e747c15aed23cd8954ad
-
Filesize
226.5MB
MD59eb0407f94ec581ac7320a024cbcdaec
SHA16ca9de0c74e0f796fe81b6c5dcaea9450670e0e3
SHA256ec40088099cdcb73287b5ddc1033b06b6807fbbb0baf2ec2de8c5e2b25e9d9e6
SHA512a617372a8f1ec6d7d4bc7d434dff99a31a4fd7c671e93d734ee31a3352138ad98d985b6075ece3ae38f3c6fd30aa9fed83e5eb46855c188c45035e502ef4ef4a
-
Filesize
216.8MB
MD5f45a85f7e56fb4a21875ae3bceb9068c
SHA1ddd9913babac77179a6d16433c9f21c886b297fc
SHA256f14f853e44b915cef89ea4493aec4e94f06228d253825cdedee5e988c7d43c83
SHA512da2321bec45f87404ac0e858ebb4f9ab1166726cdecba7116a4b9feaba904fbac051993bb4737ce8f175427e9ef7d42bcc924f096ceed0971b82d7eec71843a6
-
Filesize
217.4MB
MD5d78620571ddd4c56839301d2167a42a9
SHA1ee3a5c36ea244afd1df0be5b02dff26b3ba4a55a
SHA25635bdbd7507f80b95a02e294e2fbe825c9224960f80ff4726e92b1f0b8b7280b3
SHA5121c9ca96bd549b7afa0ed82ac69861258baf48708744f59ddd0f58e84fa847df3921228fc91fc78f4de50b6e96c4dd0cdd2d146bf3deadc71ebdbd8315e27a377
-
Filesize
215.5MB
MD5a0ea62dd51d0816c2bacb07619dfbfd2
SHA135e96c43e67751ec2e3e4aa34378e3a5b5d02702
SHA2564615366ab7fc6c0ad35fc7299ee7740c44e5eb514e949934b17c563d1c299a5c
SHA512735eb15d63734aad7c5e3d9b1c6753b8faeab6293da21a51032a4012b85ffb0c266834498457c5ad8d839e905d1781bd3974dc911bf6bd02de77d20692918763
-
Filesize
219.8MB
MD5ada79ac283ef8362080cfcabce1ac276
SHA148b1961348227647d7bb5e5dfdc27ff69bb34f11
SHA25611fce475ce9da8cc209b824c01aea0c6857cdf1cbd00a7dc6efc6a6b69d879d6
SHA512920d6726ffe86e23e46c448ecf6c5c82b41eb08bd6216853171ac7e85523a9481fb5a424c4e4f3fbdb240f1201c5038cca2b44012df0d27b941c12444c91e284
-
Filesize
218.0MB
MD5e5361ab45580db6f8d2ec5dce13e32ea
SHA12028b91b95bcae7097917b8cd054e65987f5f428
SHA256f68b98e26887cdd9477c910068c4b618921134bd27f8de263da05b1501320d70
SHA512a0d3efa634a89eb1efda62eb37a86dc8f3f7790139afb04b0c1de0b8987c23fb469dae04a5ec428be17a005c5ba4e714c3b8e8203e5d3b2d23bc10c899e0475c
-
Filesize
172.0MB
MD5644dc0cd1271672d8caf03a8716b3848
SHA1d674a106462d89c4eebf433d5ee1d86889cbb080
SHA256e084485dc1b52046cf1a53e0d9ead43815e3ba78e075db8301b89f04d9ad5278
SHA512155feaf04767e79baae68323711d96435871394ef50df150592d2cc7d588a5f821d10b2de95a55b74b731aa3eb6637a39b0915e044d15f4a99dc4bb1e9e29727
-
Filesize
166.3MB
MD5c36d8fd3d37ba7b4eeaf89af3000e9db
SHA1df07fdc2ed3093e9fe7c375251e639955ba8bcdb
SHA2566d7b7d7b2642e76aa4f25ab9310cb6d9a95cead740683d4e5bdeaa7df3acd264
SHA512d3678fa4b444b0e07462544c79adb91b46ffbf055bd02bf86edb39a8dfd33678bbe754de17251912d2089542c5e15ee6ac9e35191fd5f501bf3fdac54d51e738