Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 23:56
Behavioral task
behavioral1
Sample
75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18.exe
Resource
win7-20240215-en
General
-
Target
75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18.exe
-
Size
149KB
-
MD5
2161d47a13edf72c40953d0ce04f5c5e
-
SHA1
aa5b325b66b6ea3b4e02e0a35225431b61b454c7
-
SHA256
75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18
-
SHA512
cc8b6d148d6ca7044a5093fe3683e345a6d190e992abc75b794ce79677efd816978c5e8a051bdfb1a3c0f3cd8308353ce41dae673b94a3dad0c67f160d9df570
-
SSDEEP
1536:m8BpTjAdbGbp9WbtGnQb2fVO2zcpsbLo9ruUWpal3nHPPfTIX65zCtkBSsGu/QyK:m8sSpvo0LKrXEX65etu7v0
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1704 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
huter.exepid process 1856 huter.exe -
Loads dropped DLL 1 IoCs
Processes:
75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18.exepid process 2416 75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18.exedescription pid process target process PID 2416 wrote to memory of 1856 2416 75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18.exe huter.exe PID 2416 wrote to memory of 1856 2416 75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18.exe huter.exe PID 2416 wrote to memory of 1856 2416 75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18.exe huter.exe PID 2416 wrote to memory of 1856 2416 75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18.exe huter.exe PID 2416 wrote to memory of 1704 2416 75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18.exe cmd.exe PID 2416 wrote to memory of 1704 2416 75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18.exe cmd.exe PID 2416 wrote to memory of 1704 2416 75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18.exe cmd.exe PID 2416 wrote to memory of 1704 2416 75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18.exe"C:\Users\Admin\AppData\Local\Temp\75bb7e05ffc7fe06b9ca1948ea4ed32607cb56b29ccaaf65fd288deb159d3f18.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
PID:1856
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5f9565536e11b7fe8d014b281c88ed06f
SHA1066d4ceb3e1ca8e2500f7378c04a62fdac3eedcb
SHA256827b6e2869972d3123239400011ece7bb74aa3d569468db74eaaf41339d375c3
SHA512410e7c0cc2fc62470dee0398a5865ba4e408ae89b3d6b3479a60674bc2ebbddc155d6f5484779b114f281a34635a9ab65e0b6d41cb86c0bf78de444bb6b2bca8
-
Filesize
338B
MD5476eeebed0ba822077ce6f76e592c793
SHA13812b43b50a78df88c36eaf8396598fb786fb651
SHA256d481694b2cf6093cb875d5005bc77f243d4a1e49da82baf5a309157e6357ba64
SHA51242459b8e7517816747868a3017b095f871df1d555e856e7d3566e023354a8a3d82e08f50c2d310bd77fca035fb0cf42274264c57de9b547754209934f4b5d870
-
Filesize
149KB
MD55234256fe34d0c9244fc2f5d327ee2b9
SHA17d26c54134cf87dac29626515d7749acedb347d6
SHA2561353fd8a917fb1c7df0af903111d794a7a680cdf05bfc373265768eebaa4c1e8
SHA5121e4d298661191cf5fcd6963849c267161306f7d6f81a81b4503bb073c50d77c495ed5edc50f2836ff9aaf7c19739d20eea16eb81d662fbd9f0367936dd2440be