Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 22:02
Behavioral task
behavioral1
Sample
53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe
Resource
win7-20240221-en
General
-
Target
53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe
-
Size
505KB
-
MD5
e82dc2f700675d613eb9d3539e110979
-
SHA1
58a1c5e1c2ab44aef6e7a20e87b929c997e4ef8b
-
SHA256
53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe
-
SHA512
f489519b78f3242951a83c08133db7dd752316ae520b8833cd47f9170ef6d92c9e8902a49bbad556311fa74d9114994ae3fcca5d6b2720f775ef8b346ac3b601
-
SSDEEP
12288:6uGtVfjUBSaoINAHT19UWvMucSlFgIOguNvP/6x5:6bt2/NA3UWUuBlFLUvax5
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2536 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
rybie.exeumnio.exepid process 2016 rybie.exe 1628 umnio.exe -
Loads dropped DLL 2 IoCs
Processes:
53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exerybie.exepid process 2524 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe 2016 rybie.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
umnio.exepid process 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe 1628 umnio.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exerybie.exedescription pid process target process PID 2524 wrote to memory of 2016 2524 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe rybie.exe PID 2524 wrote to memory of 2016 2524 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe rybie.exe PID 2524 wrote to memory of 2016 2524 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe rybie.exe PID 2524 wrote to memory of 2016 2524 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe rybie.exe PID 2524 wrote to memory of 2536 2524 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe cmd.exe PID 2524 wrote to memory of 2536 2524 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe cmd.exe PID 2524 wrote to memory of 2536 2524 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe cmd.exe PID 2524 wrote to memory of 2536 2524 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe cmd.exe PID 2016 wrote to memory of 1628 2016 rybie.exe umnio.exe PID 2016 wrote to memory of 1628 2016 rybie.exe umnio.exe PID 2016 wrote to memory of 1628 2016 rybie.exe umnio.exe PID 2016 wrote to memory of 1628 2016 rybie.exe umnio.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe"C:\Users\Admin\AppData\Local\Temp\53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\rybie.exe"C:\Users\Admin\AppData\Local\Temp\rybie.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\umnio.exe"C:\Users\Admin\AppData\Local\Temp\umnio.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_uinsey.batFilesize
340B
MD5d0025df6a661a237ab2a386a04300dd9
SHA1c6cd0b9269551595fee1082d6fb70613c071f4df
SHA2568acc6487d10a6c4d45ec607e4a0db85c00ed7314aaed7a0fd01db409420d1ecf
SHA512f90e63f47dceaa85ffffb0e42fd44fe347dd4fe2e33ed3e3b7b3d4a485f0aaf7df06ac21f8921cdd4d5e249d68cc0f0fc4303a282b1505d2eb036e41b9d23ac3
-
C:\Users\Admin\AppData\Local\Temp\golfinfo.iniFilesize
512B
MD5ec4ba8481bfedc6438c33ea682521f29
SHA19d60c1ea643b81104d8128e2110197691980c17c
SHA256d94a80e3b1ab213e581f07bb690ec4caa03c6d15608a18bb12bb9969bcdca479
SHA5122a8fdf1eb19ab4436b03f8e0b3fc707cee3d7e98301cfb0b32d29ed490e67fef3ba3578845a7986466544a568d0bd366734d1e9c0b7a8b1627abc5e147b39b4a
-
C:\Users\Admin\AppData\Local\Temp\rybie.exeFilesize
505KB
MD502b5c32964d7fd8c970bb02bc1939ad6
SHA1cdd2e918eb7e0d75e0b932fac4db120ca24543d9
SHA256821437a2f17214a1c34fd68b2266d6a346f04c894e91df457d91d1d5e3761c64
SHA512e75b436d10046cf68de9cab57e8c4b3592815acecab98c62687c95610458ccef31c3594ab637ce48601ad1b2219419e97328a70cb20ff1c07c4523292b3aa2eb
-
C:\Users\Admin\AppData\Local\Temp\umnio.exeFilesize
186KB
MD5c8a11f14d879345a4a9a1e841cccd875
SHA16fa562c892b0e5015ea99fb69cde423cc82bb413
SHA256ba0984a3c7fcd5327681a300e3ed1165556e9f445c8493fed89ad7bb2aa3b367
SHA5121d1015c68b25c7fd943b60cbd6166f5d193de6e86676336cc73361c57b47e143b8f6c278ced01c5c18e7cf921a18c567fd352c2b5e1de2cddeb29e5b612ac671
-
\Users\Admin\AppData\Local\Temp\rybie.exeFilesize
505KB
MD56c2627dc28779818b7397681c7b322c7
SHA146cfb2c34f5b54d2fee0d75dbbaff7cc81b9e899
SHA256cf7192c22da69580556f66c1c0dc17ed14297181f3c99f03e32cc22a90dcc3ab
SHA512c65ff7fbd557451c4ad188001a13f2b8db8f2cac774ff7eab2c715caa7b1e8a7fdf37f5ef96a93911ade5a442ffb2075432b66b8bfef4eced90763cdf832e175
-
memory/1628-31-0x00000000003E0000-0x0000000000476000-memory.dmpFilesize
600KB
-
memory/1628-32-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB
-
memory/1628-27-0x00000000003E0000-0x0000000000476000-memory.dmpFilesize
600KB
-
memory/1628-35-0x00000000003E0000-0x0000000000476000-memory.dmpFilesize
600KB
-
memory/1628-36-0x00000000003E0000-0x0000000000476000-memory.dmpFilesize
600KB
-
memory/1628-37-0x00000000003E0000-0x0000000000476000-memory.dmpFilesize
600KB
-
memory/1628-38-0x00000000003E0000-0x0000000000476000-memory.dmpFilesize
600KB
-
memory/1628-39-0x00000000003E0000-0x0000000000476000-memory.dmpFilesize
600KB
-
memory/2016-30-0x00000000032B0000-0x0000000003346000-memory.dmpFilesize
600KB
-
memory/2016-26-0x0000000000400000-0x0000000000485000-memory.dmpFilesize
532KB
-
memory/2016-16-0x0000000000400000-0x0000000000485000-memory.dmpFilesize
532KB
-
memory/2524-17-0x0000000000400000-0x0000000000485000-memory.dmpFilesize
532KB
-
memory/2524-0-0x0000000000400000-0x0000000000485000-memory.dmpFilesize
532KB