Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23/04/2024, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
7eaa919c50e3132fb83df3e017ca6c903d204ff6874908ab36a5f901d3103778.exe
Resource
win7-20240220-en
General
-
Target
7eaa919c50e3132fb83df3e017ca6c903d204ff6874908ab36a5f901d3103778.exe
-
Size
349KB
-
MD5
248149186ee11d00ed6e4166495fb1f3
-
SHA1
8c9d2e1f12e504ce54f7f4e0aa04f9213dff5f6e
-
SHA256
7eaa919c50e3132fb83df3e017ca6c903d204ff6874908ab36a5f901d3103778
-
SHA512
456e5377812dcb8926f9c4588c9a0fd91b41c2e2cb6409b257625f649e48d9b53851a5046236ac2d5ef6df3d98922a19dd550c4650335d0b7e6afd37a9119784
-
SSDEEP
6144:SaVKyyzwbnUkoiqwcAR92o29tZTEr6UTdO5CksxCDy9pPbzBHU2ytluFn7:g7yUTihRQhE9ONs46pP3BHUbtE7
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Deletes itself 1 IoCs
pid Process 2492 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2688 piuhv.exe 2276 roqye.exe -
Loads dropped DLL 2 IoCs
pid Process 1728 7eaa919c50e3132fb83df3e017ca6c903d204ff6874908ab36a5f901d3103778.exe 2688 piuhv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe 2276 roqye.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2688 1728 7eaa919c50e3132fb83df3e017ca6c903d204ff6874908ab36a5f901d3103778.exe 29 PID 1728 wrote to memory of 2688 1728 7eaa919c50e3132fb83df3e017ca6c903d204ff6874908ab36a5f901d3103778.exe 29 PID 1728 wrote to memory of 2688 1728 7eaa919c50e3132fb83df3e017ca6c903d204ff6874908ab36a5f901d3103778.exe 29 PID 1728 wrote to memory of 2688 1728 7eaa919c50e3132fb83df3e017ca6c903d204ff6874908ab36a5f901d3103778.exe 29 PID 1728 wrote to memory of 2492 1728 7eaa919c50e3132fb83df3e017ca6c903d204ff6874908ab36a5f901d3103778.exe 30 PID 1728 wrote to memory of 2492 1728 7eaa919c50e3132fb83df3e017ca6c903d204ff6874908ab36a5f901d3103778.exe 30 PID 1728 wrote to memory of 2492 1728 7eaa919c50e3132fb83df3e017ca6c903d204ff6874908ab36a5f901d3103778.exe 30 PID 1728 wrote to memory of 2492 1728 7eaa919c50e3132fb83df3e017ca6c903d204ff6874908ab36a5f901d3103778.exe 30 PID 2688 wrote to memory of 2276 2688 piuhv.exe 34 PID 2688 wrote to memory of 2276 2688 piuhv.exe 34 PID 2688 wrote to memory of 2276 2688 piuhv.exe 34 PID 2688 wrote to memory of 2276 2688 piuhv.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eaa919c50e3132fb83df3e017ca6c903d204ff6874908ab36a5f901d3103778.exe"C:\Users\Admin\AppData\Local\Temp\7eaa919c50e3132fb83df3e017ca6c903d204ff6874908ab36a5f901d3103778.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\piuhv.exe"C:\Users\Admin\AppData\Local\Temp\piuhv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\roqye.exe"C:\Users\Admin\AppData\Local\Temp\roqye.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD59a92e07ea777eb97fe5daa1c1c8510c4
SHA1ffde2cec0f30a2ffdf8eab8bc0695faad7b804bf
SHA256eaf6b41f4bbc35a3282790d69cba7950d818d619592c4163da9dc087e9ec634b
SHA5129e6798b78c16a57b2d0d6e88fa3885168050a936791d99899f7493d5eedef108dadbc312e1908431b79d60cf3e20e7dc9477bd882646e2f845f5e9c50dba1bb4
-
Filesize
512B
MD5e8c8ac917099bfc4ed0eea3866bfb03e
SHA1e79cc47f68f0c7261bbab618b46917e2a9924661
SHA256345bfe79c398ea573df7d35b25a4dc586c78516d1ea6aca5f05c7ddda72d19b0
SHA5120559566874652df97efd2c89077008c87b24fa726813312725119c0e189795335f89a69baeff71b8d66659b28c3b264e385f6d92039bc2430c38287eb165c842
-
Filesize
244KB
MD5f3f7ba680ac32e54a9872065c3a638a3
SHA190c787935bf6c1a4ffe3a87db6ddc937eee98794
SHA256f21d4b862c2a570b7593a62c1b9fc50d23e7d7d48944d86c390c158b1a4fd9d0
SHA512a6db8d63a668071193f9046c1448703356d66382690f9b72a1ba85bbf24f825e50f4808f4b18cb0caeb5744781fac0a31af22f10d55425f70438ace1afdd1b0e
-
Filesize
349KB
MD538776f0f894be2ff771743b68541859e
SHA1633aede71edaf256dcfb8c29e1e66294628bb312
SHA25644cbe2d268b0fbe10c36382fab36a21b04536a37ff07f34398711339c349f6a1
SHA51294be88e135d9c60507fd8b3092c0bf7e1f7ab79da938899603fe53c57a4b896354d2e05ecf82cfaa49264766af5546cd267f7430700369d0eedf4e440a869d02