Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 04:30
Static task
static1
Behavioral task
behavioral1
Sample
e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exe
Resource
win7-20240221-en
General
-
Target
e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exe
-
Size
6.4MB
-
MD5
43859040ad488d1f1ceb32cdc9f4da18
-
SHA1
fdaeeb8b4ad0e3b54a270dd54260e4a841844fd4
-
SHA256
e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f
-
SHA512
4f2a98e263ac2ae8323dfd38956b7448e119f787d60b0cc1dd031032b0be37e6176ab4ea2c25eaaf3601b158f965831beb51df68be6d48bd81bdeb7717648a88
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSt:i0LrA2kHKQHNk3og9unipQyOaOt
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
UPX dump on OEP (original entry point) 3 IoCs
Processes:
resource yara_rule behavioral1/memory/880-168-0x0000000000400000-0x0000000000599000-memory.dmp UPX \Users\Admin\AppData\Local\Temp\pyujb.exe UPX behavioral1/memory/880-174-0x0000000000400000-0x0000000000599000-memory.dmp UPX -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2584 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
zupop.execocytu.exepyujb.exepid process 2716 zupop.exe 2568 cocytu.exe 880 pyujb.exe -
Loads dropped DLL 5 IoCs
Processes:
e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exezupop.execocytu.exepid process 2400 e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exe 2400 e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exe 2716 zupop.exe 2716 zupop.exe 2568 cocytu.exe -
Processes:
resource yara_rule behavioral1/memory/880-168-0x0000000000400000-0x0000000000599000-memory.dmp upx \Users\Admin\AppData\Local\Temp\pyujb.exe upx behavioral1/memory/880-174-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exezupop.execocytu.exepyujb.exepid process 2400 e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exe 2716 zupop.exe 2568 cocytu.exe 880 pyujb.exe 880 pyujb.exe 880 pyujb.exe 880 pyujb.exe 880 pyujb.exe 880 pyujb.exe 880 pyujb.exe 880 pyujb.exe 880 pyujb.exe 880 pyujb.exe 880 pyujb.exe 880 pyujb.exe 880 pyujb.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exezupop.execocytu.exedescription pid process target process PID 2400 wrote to memory of 2716 2400 e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exe zupop.exe PID 2400 wrote to memory of 2716 2400 e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exe zupop.exe PID 2400 wrote to memory of 2716 2400 e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exe zupop.exe PID 2400 wrote to memory of 2716 2400 e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exe zupop.exe PID 2400 wrote to memory of 2584 2400 e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exe cmd.exe PID 2400 wrote to memory of 2584 2400 e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exe cmd.exe PID 2400 wrote to memory of 2584 2400 e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exe cmd.exe PID 2400 wrote to memory of 2584 2400 e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exe cmd.exe PID 2716 wrote to memory of 2568 2716 zupop.exe cocytu.exe PID 2716 wrote to memory of 2568 2716 zupop.exe cocytu.exe PID 2716 wrote to memory of 2568 2716 zupop.exe cocytu.exe PID 2716 wrote to memory of 2568 2716 zupop.exe cocytu.exe PID 2568 wrote to memory of 880 2568 cocytu.exe pyujb.exe PID 2568 wrote to memory of 880 2568 cocytu.exe pyujb.exe PID 2568 wrote to memory of 880 2568 cocytu.exe pyujb.exe PID 2568 wrote to memory of 880 2568 cocytu.exe pyujb.exe PID 2568 wrote to memory of 1152 2568 cocytu.exe cmd.exe PID 2568 wrote to memory of 1152 2568 cocytu.exe cmd.exe PID 2568 wrote to memory of 1152 2568 cocytu.exe cmd.exe PID 2568 wrote to memory of 1152 2568 cocytu.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exe"C:\Users\Admin\AppData\Local\Temp\e3030a1e243f1c4fc193a0b36d23f7cd8afcaf59cce327f0e233d2895b74945f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\zupop.exe"C:\Users\Admin\AppData\Local\Temp\zupop.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\cocytu.exe"C:\Users\Admin\AppData\Local\Temp\cocytu.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\pyujb.exe"C:\Users\Admin\AppData\Local\Temp\pyujb.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:880
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:1152
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD520e9893e9c6376bcd5b31577cc4cd920
SHA12e8311391fc6bedb98f7c364bf412f6f66569c44
SHA256d02101ad651761c8dc18ffbc905b75aed8084ff0a7f76176676fceb2a901d7cb
SHA512be455ac818085870d33b6410501b541db6e85e0d82071bbd0a3b90ede9aacdb8e3b4e004c4a88a76d7952633ac76ecdf908e61b49cdae686d50db32baabaac76
-
Filesize
224B
MD506ed9929f2f81e1a7cc75476f113fa6f
SHA1ba9c2cd1c970ca075b968f5e41d7a84b827480da
SHA256236a6a7eca704cfccf4975d16d8c492853814c9f626b4986737a021da28861d9
SHA5121a98694287f07a773ae9345b8706436e7f5874f617afe7712407be9094190de44a7853266a4aeb92367cceada45a34ace72f9f06fffb8f4ecbfd90b50b94ffd2
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5b2f5d3ac14602beb15ce5860c41c51e5
SHA184be677185fdb52ec98999dec755736b714474a0
SHA256c28076b9fa4643770ad49710a1851e7421cbcaef60cf1c7294e88d77b3851adf
SHA51225cd82344a82aacfa2ce4201a7a798eb023bb54afbb68c32009c334ed7402565992e6d77c016255a34214256e57a22ed38b844d0edeac7cad36b973465db7fb6
-
Filesize
459KB
MD5f4de9870bb36c0e18a53dd695b0c68c5
SHA17ef31d6c94cc74a2b9c2bb51669acca48f5d0c96
SHA2568b1c7755f00236eff2dd1269d5a415341d683aa6221b75a722e665923e3d5d9b
SHA512e4250ff5ac22ffd649f4531305992e280d665a3871b0dcc13231897a8622284c4d5815696c5b1267f92692e6377eef5517119c3a0ce5735b74f02f4a747f92b8
-
Filesize
6.4MB
MD54ee431b1d22a2f1382e6e62a0c91dffc
SHA1dabdbae6d17c37494b2c637bd4213a5bb8308ea9
SHA256050fce7a2181455344f96102d6747292a7d0c69a79a016270a5964ee96ee6afc
SHA512e00df340043dd26c418e96ed996a337462f17858ab589cef09348e8f5cb381b81fe4e545239180ce8a492cd00d15e5b9e223b79667716bc407f482d6b1adc28e