Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 02:38
Behavioral task
behavioral1
Sample
a2d4f65d72692904575323c52235d7411b58a1790bf351701e624f41face8e8c.exe
Resource
win7-20240221-en
General
-
Target
a2d4f65d72692904575323c52235d7411b58a1790bf351701e624f41face8e8c.exe
-
Size
137KB
-
MD5
33a5813e0d52f3fad7fff1f61f21716a
-
SHA1
9a20a1149499dc7e991ddd26ba5f381ecd9c5eca
-
SHA256
a2d4f65d72692904575323c52235d7411b58a1790bf351701e624f41face8e8c
-
SHA512
b65c4b9f1b760ab3c281aa8e791b1977a8807b87ea0c1a44ecc151a8f78aa1d8094c0a26cb18f8a09c53c3764a6aba4664b135eaece14b23da56a20664ff314e
-
SSDEEP
1536:X2nrJLwAXDtIBcUyk+8CooNvy3GNbcq7+sWjcd2x64Tb/pe6A8:GtpCP+/oGvWSld2x64Tb/p7R
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Deletes itself 1 IoCs
pid Process 2564 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2076 biudfw.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 a2d4f65d72692904575323c52235d7411b58a1790bf351701e624f41face8e8c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2076 2368 a2d4f65d72692904575323c52235d7411b58a1790bf351701e624f41face8e8c.exe 28 PID 2368 wrote to memory of 2076 2368 a2d4f65d72692904575323c52235d7411b58a1790bf351701e624f41face8e8c.exe 28 PID 2368 wrote to memory of 2076 2368 a2d4f65d72692904575323c52235d7411b58a1790bf351701e624f41face8e8c.exe 28 PID 2368 wrote to memory of 2076 2368 a2d4f65d72692904575323c52235d7411b58a1790bf351701e624f41face8e8c.exe 28 PID 2368 wrote to memory of 2564 2368 a2d4f65d72692904575323c52235d7411b58a1790bf351701e624f41face8e8c.exe 29 PID 2368 wrote to memory of 2564 2368 a2d4f65d72692904575323c52235d7411b58a1790bf351701e624f41face8e8c.exe 29 PID 2368 wrote to memory of 2564 2368 a2d4f65d72692904575323c52235d7411b58a1790bf351701e624f41face8e8c.exe 29 PID 2368 wrote to memory of 2564 2368 a2d4f65d72692904575323c52235d7411b58a1790bf351701e624f41face8e8c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2d4f65d72692904575323c52235d7411b58a1790bf351701e624f41face8e8c.exe"C:\Users\Admin\AppData\Local\Temp\a2d4f65d72692904575323c52235d7411b58a1790bf351701e624f41face8e8c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:2076
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD56c0b907fca9932d047d2d62397fc77c8
SHA1a800463237fd15e852280dc176deae20062ab04c
SHA256ba343aa577d2f0a5a572e9d460a3522777274d4556f1aa6c739e1103bf6bfd2b
SHA512f648ddb18664a280772ed61f084866684a525b543408b3d530a6fb11b5dcf14a3e42c0f4f8f92aedf7543309106e83a07f6cd30369a72bc786882f30c2d90c18
-
Filesize
512B
MD5123487d739994edb1c87f900b7e6f8f2
SHA17f74a890d5dab64b8c6cda502e9d63ae715602df
SHA256dabc2578a2a9d46c36a9d4839c5f32b659b078e0dca603beff62a2856aff96fe
SHA5125992efcde435c7598c077e5781cece0648948f15415abaca75c3e162a57ee71bdf578cbf110f2c52341389c0eb0cf655612599d4d88efb8bbae7644c5c79bde6
-
Filesize
338B
MD5e0fcf5f78ea1cc996c58dcc1e7e4ebe7
SHA18849d198d3cfbc5fe3a967c99d71f86503601a82
SHA2568e3383cd0fb7791d3ba12eb423cec764ac2f5d3df61cd63f2e387cf984d0c0c7
SHA512f48b3521358b2590dcc1c31254c914994174cd2e9738768e10a03eee47ead0745fe8c2a647bbf599697038ebd32c8678b3a09c127bb7e03cc563a8b5636bbfc8