Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 21:26
Behavioral task
behavioral1
Sample
3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272.exe
Resource
win7-20240508-en
General
-
Target
3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272.exe
-
Size
516KB
-
MD5
d200af10617c97ddd4fa9eb866c715ad
-
SHA1
c3080251af403cc47cb9afa243b838ac11c6214c
-
SHA256
3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272
-
SHA512
21fe0d992b7c83ed8d2e813cff68918c861ffa65b21ff8a5dc9984f789800db0aa4392ce8a153df3b471c67e5f830754cf81b11b27bb88d96be3cfb167059202
-
SSDEEP
12288:RyPHijVSuJqu4kw6eDPvjJ81VGqK6GvPN:RuCTq4w6or+GnV
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2980 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
pevey.exeytsae.exepid process 1244 pevey.exe 344 ytsae.exe -
Loads dropped DLL 2 IoCs
Processes:
3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272.exepevey.exepid process 1492 3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272.exe 1244 pevey.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
ytsae.exepid process 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe 344 ytsae.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272.exepevey.exedescription pid process target process PID 1492 wrote to memory of 1244 1492 3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272.exe pevey.exe PID 1492 wrote to memory of 1244 1492 3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272.exe pevey.exe PID 1492 wrote to memory of 1244 1492 3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272.exe pevey.exe PID 1492 wrote to memory of 1244 1492 3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272.exe pevey.exe PID 1492 wrote to memory of 2980 1492 3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272.exe cmd.exe PID 1492 wrote to memory of 2980 1492 3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272.exe cmd.exe PID 1492 wrote to memory of 2980 1492 3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272.exe cmd.exe PID 1492 wrote to memory of 2980 1492 3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272.exe cmd.exe PID 1244 wrote to memory of 344 1244 pevey.exe ytsae.exe PID 1244 wrote to memory of 344 1244 pevey.exe ytsae.exe PID 1244 wrote to memory of 344 1244 pevey.exe ytsae.exe PID 1244 wrote to memory of 344 1244 pevey.exe ytsae.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272.exe"C:\Users\Admin\AppData\Local\Temp\3899a4f6b1d7227ce2120f8d25eb74809d6558b4cf95abfc4d2889c9569dc272.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\pevey.exe"C:\Users\Admin\AppData\Local\Temp\pevey.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\ytsae.exe"C:\Users\Admin\AppData\Local\Temp\ytsae.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:344
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5c2b12902d988ed6ceafbefd0ffbb066b
SHA18de7cfb53670e2259c2855d2f3d8bb5cc6bd1d32
SHA256d01a51ffb5cb09868bb37d5e78852015757de96ea56a2ef4bbb1d6a6d09a937d
SHA512d0e9f35cde6e50bd64a981feabbdb67b2ff229faf25f2ac04f9cf6351afa9cf559788d0a750f3d5fee847c74333f49a6e0cda89e6214b373580bca64d486a12c
-
Filesize
512B
MD55af6356b90b83ee6aa488afa53dd4673
SHA1bcad63c672fba0e965e6201694f2058859b0adfe
SHA256bf3681a82fc4945800d9963ff7a866ca2728eaadec750906bc4ff9ba6c5eb8a4
SHA512411137065c1093386a6b2b786029bf7c0c9c7fcb7d8f5a40e370f7094021fc0ac2984ddd2f71c7f7d6102ade4dbd698c616f779f12c9ad3d38791ffa71f5a2a9
-
Filesize
516KB
MD5e2290e22203130932304688c3e94f15f
SHA1a64017c57d9544e85561a87d1fe45a6c469d0bbd
SHA256429b9b0991c929af116bf8cc883ee64ed1adc6230023c3ffd3e8f58ccb837387
SHA512609e5d5109fbf3027e4fa6e70c23496f0cc302fdfda8e82399cc880cf174625e0b4475dd217d0bc6e6cd5b53c7402f3604743bab39269388a3976e78a32c8383
-
Filesize
179KB
MD558cd3dd8a15dc8cc796eb098b6d1d4d7
SHA10b02aeccd1cbc20c0247a7c6a868636d5d80f201
SHA25685969942ae6e3e973f08a42ec8b9e3234d97b5ec7a29f93a8ca23788dfc3d7f8
SHA51203ec872e94d753b4dedf79a245a62c25af14bb37f6c979a04a73f1a4de552863589d5c85a600132bedc13013c2964f0e89adc9ab461a9f48a73271238fd1e0a6
-
Filesize
516KB
MD50f5f49b63b53624378815030fd5fda67
SHA10d12a84da8e6d0d4b12a209f59d5c154552960f0
SHA256a6c7d15b08b9f13cabba85d13ece08fb2b30c84007cd976b15d54ead5ab1d9bc
SHA512dc6e5592455f217a449e6d7f2fc681df51568eeeed71b0575961e70cca79d62e615b4d3d4e0837000bcdf5284f4347da8f14e79dae01ee7377646ba0f3275990