Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 01:54
Static task
static1
Behavioral task
behavioral1
Sample
af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exe
Resource
win7-20240215-en
General
-
Target
af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exe
-
Size
6.5MB
-
MD5
b8f48f81154e07c64dbe8880bc698df0
-
SHA1
c57afa057e3eb8523e4f1afe260358a31e73a7e2
-
SHA256
af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289
-
SHA512
dbc1b7468063683bc173dec7fa0efa3c33d9a6e78fadd391804cadcf4d2473c0b65043cd83c9ed05d6104ac8fe43a333c3beb02b01aee44156832bfdf4f55e80
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSK:i0LrA2kHKQHNk3og9unipQyOaOK
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
UPX dump on OEP (original entry point) 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\tuorl.exe UPX behavioral1/memory/1132-170-0x0000000000400000-0x0000000000599000-memory.dmp UPX behavioral1/memory/1132-176-0x0000000000400000-0x0000000000599000-memory.dmp UPX -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2152 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
wuojj.exewuenzo.exetuorl.exepid process 2524 wuojj.exe 2708 wuenzo.exe 1132 tuorl.exe -
Loads dropped DLL 5 IoCs
Processes:
af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exewuojj.exewuenzo.exepid process 2108 af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exe 2108 af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exe 2524 wuojj.exe 2524 wuojj.exe 2708 wuenzo.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\tuorl.exe upx behavioral1/memory/1132-170-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral1/memory/1132-176-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exewuojj.exewuenzo.exetuorl.exepid process 2108 af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exe 2524 wuojj.exe 2708 wuenzo.exe 1132 tuorl.exe 1132 tuorl.exe 1132 tuorl.exe 1132 tuorl.exe 1132 tuorl.exe 1132 tuorl.exe 1132 tuorl.exe 1132 tuorl.exe 1132 tuorl.exe 1132 tuorl.exe 1132 tuorl.exe 1132 tuorl.exe 1132 tuorl.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exewuojj.exewuenzo.exedescription pid process target process PID 2108 wrote to memory of 2524 2108 af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exe wuojj.exe PID 2108 wrote to memory of 2524 2108 af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exe wuojj.exe PID 2108 wrote to memory of 2524 2108 af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exe wuojj.exe PID 2108 wrote to memory of 2524 2108 af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exe wuojj.exe PID 2108 wrote to memory of 2152 2108 af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exe cmd.exe PID 2108 wrote to memory of 2152 2108 af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exe cmd.exe PID 2108 wrote to memory of 2152 2108 af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exe cmd.exe PID 2108 wrote to memory of 2152 2108 af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exe cmd.exe PID 2524 wrote to memory of 2708 2524 wuojj.exe wuenzo.exe PID 2524 wrote to memory of 2708 2524 wuojj.exe wuenzo.exe PID 2524 wrote to memory of 2708 2524 wuojj.exe wuenzo.exe PID 2524 wrote to memory of 2708 2524 wuojj.exe wuenzo.exe PID 2708 wrote to memory of 1132 2708 wuenzo.exe tuorl.exe PID 2708 wrote to memory of 1132 2708 wuenzo.exe tuorl.exe PID 2708 wrote to memory of 1132 2708 wuenzo.exe tuorl.exe PID 2708 wrote to memory of 1132 2708 wuenzo.exe tuorl.exe PID 2708 wrote to memory of 844 2708 wuenzo.exe cmd.exe PID 2708 wrote to memory of 844 2708 wuenzo.exe cmd.exe PID 2708 wrote to memory of 844 2708 wuenzo.exe cmd.exe PID 2708 wrote to memory of 844 2708 wuenzo.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exe"C:\Users\Admin\AppData\Local\Temp\af5445831e1daa125e35a5f94ebb6876130fa0d347483d93aa9ca0592d564289.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\wuojj.exe"C:\Users\Admin\AppData\Local\Temp\wuojj.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\wuenzo.exe"C:\Users\Admin\AppData\Local\Temp\wuenzo.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\tuorl.exe"C:\Users\Admin\AppData\Local\Temp\tuorl.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1132 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:844
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
PID:2152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD5d00d6d5c9eb714bee5b53c1c61f7b120
SHA1e793cae26a4c74eb658c463a7191e57b00784320
SHA256efc3b97fe4f8f20d2edc0448336276c5866231e14ef327abe97c519728c6578d
SHA512b7d684130b59927129d302f40f8fbac4894af2e1a6d0c1fa018b80bfab8cf5bd045abe8a1d5357a18ba14a66fe7a8adc0404a1abec5797546dfcf739a5b8b341
-
Filesize
340B
MD5ad9f65d95d65a29221128809d5235fab
SHA11862730e26848347779c1ab93c965131734ec791
SHA25699722a3473b2e0b3a590b504b4920a6bfad2d45cb421696fefc95f1ae5f3d54c
SHA512dd478d5842e2ad4b11a5201d8a5c0a8a5754b818376beb1301f0d2bde962f2fb73016a3c9668131bdf06ceaba9cdc1883a49cacda1d6c710701658d5036c30be
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5e61e87bf077e231997b83f6aa97fc663
SHA1bb9b6f69f50532deee681a0927c75a3cec899512
SHA2564069e3e1fae4f0eda9a90a0a2e1f0473b38e6759e1320ccf477c728b3ae71c80
SHA5121386cf65eaf71ae06fd3434ba78ffc15a6b06d4638f9efaa442b69501a2bd5c5b691b90fc348b2e9fde3b24ab3d67b702fbb769015b4c6b33f09610488acd26a
-
Filesize
6.5MB
MD5462b8b191743533078be8c3c26092a27
SHA1e21ba24e1e40119caa881e2280836afeff3815a8
SHA256deb0ee0d4311cb036832be0633c9cbc90dadc56dbbb23f241d220d2d581ef403
SHA51216759666a5681a9ffbb54024c64e6dbde4841bd63afb596e8ec0303629aac416bf19bf2cdf5e364af3ab2f01cb9d77969f570b2f672cb99b419c1a1d041b3656
-
Filesize
459KB
MD5461589898a27884e4b6c9475b2500d14
SHA1ab944236cdc054c7ea9d3d115ddbd96103f1cc0b
SHA256f7e9fe9699e14e827a9058dcdf4a6c5e21a9e599458ed2762ad9ee235abba830
SHA5122dc34bee9e61598747f18af60a19c33ac7f76d58ee2948e1f98a5ee305b1bfff840022fe30a7d4cc790c5d7bb8e7436bf971503c757a8301e6c544cf92ba7ece