Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:06
Static task
static1
Behavioral task
behavioral1
Sample
9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe
Resource
win7-20240220-en
General
-
Target
9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe
-
Size
6.5MB
-
MD5
99376ee4ed70611e27327a144ce46553
-
SHA1
49bdca60f10a3b2957824c16b0bc862224fb0d59
-
SHA256
9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db
-
SHA512
bcaa3490a23d7614aa888c6cd344d3f0a5c7a3ababdcc26646a6475ee3696c8d02a6930c9007cc2c149fff9881151dc0f81141626c511935aa64941a54954320
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSW:i0LrA2kHKQHNk3og9unipQyOaOW
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
UPX dump on OEP (original entry point) 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\azhur.exe UPX behavioral1/memory/676-161-0x0000000000400000-0x0000000000599000-memory.dmp UPX behavioral1/memory/676-174-0x0000000000400000-0x0000000000599000-memory.dmp UPX -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2964 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
nuazd.exefyyqwi.exeazhur.exepid process 2692 nuazd.exe 2628 fyyqwi.exe 676 azhur.exe -
Loads dropped DLL 5 IoCs
Processes:
9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exenuazd.exefyyqwi.exepid process 1740 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe 1740 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe 2692 nuazd.exe 2692 nuazd.exe 2628 fyyqwi.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\azhur.exe upx behavioral1/memory/676-161-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral1/memory/2628-159-0x0000000004860000-0x00000000049F9000-memory.dmp upx behavioral1/memory/676-174-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exenuazd.exefyyqwi.exeazhur.exepid process 1740 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe 2692 nuazd.exe 2628 fyyqwi.exe 676 azhur.exe 676 azhur.exe 676 azhur.exe 676 azhur.exe 676 azhur.exe 676 azhur.exe 676 azhur.exe 676 azhur.exe 676 azhur.exe 676 azhur.exe 676 azhur.exe 676 azhur.exe 676 azhur.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exenuazd.exefyyqwi.exedescription pid process target process PID 1740 wrote to memory of 2692 1740 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe nuazd.exe PID 1740 wrote to memory of 2692 1740 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe nuazd.exe PID 1740 wrote to memory of 2692 1740 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe nuazd.exe PID 1740 wrote to memory of 2692 1740 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe nuazd.exe PID 1740 wrote to memory of 2964 1740 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe cmd.exe PID 1740 wrote to memory of 2964 1740 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe cmd.exe PID 1740 wrote to memory of 2964 1740 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe cmd.exe PID 1740 wrote to memory of 2964 1740 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe cmd.exe PID 2692 wrote to memory of 2628 2692 nuazd.exe fyyqwi.exe PID 2692 wrote to memory of 2628 2692 nuazd.exe fyyqwi.exe PID 2692 wrote to memory of 2628 2692 nuazd.exe fyyqwi.exe PID 2692 wrote to memory of 2628 2692 nuazd.exe fyyqwi.exe PID 2628 wrote to memory of 676 2628 fyyqwi.exe azhur.exe PID 2628 wrote to memory of 676 2628 fyyqwi.exe azhur.exe PID 2628 wrote to memory of 676 2628 fyyqwi.exe azhur.exe PID 2628 wrote to memory of 676 2628 fyyqwi.exe azhur.exe PID 2628 wrote to memory of 1268 2628 fyyqwi.exe cmd.exe PID 2628 wrote to memory of 1268 2628 fyyqwi.exe cmd.exe PID 2628 wrote to memory of 1268 2628 fyyqwi.exe cmd.exe PID 2628 wrote to memory of 1268 2628 fyyqwi.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe"C:\Users\Admin\AppData\Local\Temp\9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\nuazd.exe"C:\Users\Admin\AppData\Local\Temp\nuazd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\fyyqwi.exe"C:\Users\Admin\AppData\Local\Temp\fyyqwi.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\azhur.exe"C:\Users\Admin\AppData\Local\Temp\azhur.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:676 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:1268
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
PID:2964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5994a5ec7e19de459ba156d24f14a6fe7
SHA15d30972269a7468f80267f13c6cafa156a5d0a56
SHA25632ffc0db52cc85930d31f5c997bac3c75c4349485bbf769f90a08e2de91806b8
SHA512ea24550e7787cc220fa9c13625bd40a4da03da671ab4f63677a5bc24055e5fe441c006fad716363f392c47b02d8e42674db8092d7db917a80846eb215023efe9
-
Filesize
224B
MD557be345a625defe2e1006c9ae463aa94
SHA1954935a2d0c7021d2387c44f5039ef1029a53f8b
SHA2562de5aef3565fe1ebad3b17140d8d2edfe13127c137060a75ffd05b0a04cedcf9
SHA512e7b70145882d58d6ec70603d91d1b72e0eda6bd686d32c1df07d9e9e8ce7308dbe8cd07286ed518e7b02de6bbb894182846708597c0d07bc8e081da4d45207eb
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD55ce1d636f460f0af4fc58b5ed6237c31
SHA1606277a3b5bf108246d9cbf0c1e27b528031a269
SHA2561c86c32faead224200d426dacb35b86eda0c3ee9550ccf99e4dce1f53ce202e2
SHA512495e87582656c38103e8b0d0b7c42720b6c2b80274298c72b82bbb289bdb5b8497f5ec2e9f46d44d998013b5ef4ead3bfaddac179d5f26bde167f24e5896ae67
-
Filesize
6.5MB
MD57677cacb3fbb5d96d1cdc7c3963f9134
SHA12c99bd473f17960f93dace50128f33327b7f4e4e
SHA256e93f6eb39e16a28d2440ccd6d2c60693408e9ec069cbb6991eb46b5b9c3ed3b2
SHA512069817b1b5077ecbeeec4201f861b5cacc57b4204bb8802c3e916a3313c5f1bfc1daa3d16d8e70e4b3a260b08612a310d82e5d4b0dd0ec98d1843a7ad5d4db78
-
Filesize
459KB
MD57e3c7cd80a77c26a3fa4bf12f02854c8
SHA110f42921491b0928964259a1f11e82f79f99d438
SHA256a927483cc62eabf304766f064758ab98225ba3872ca03d70e1302518589c2d55
SHA5121d93fe0721590f0187c009122323775672ac66dff6bb2e8620be27f28e9db6af053eb4b716a90d493340b47b650df287a254955bf91925034baca0b433b5af91