Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 03:12
Behavioral task
behavioral1
Sample
d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0.exe
Resource
win7-20240419-en
General
-
Target
d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0.exe
-
Size
368KB
-
MD5
b725608c76d7a01dc966c2707604e459
-
SHA1
5e31cf379c12e2f3582fb4df5ade53ab660af3ed
-
SHA256
d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0
-
SHA512
14e17966aa916da982ffe5ac71857aea1a0f78715b94d9a9926645f094856647b04a6b312d2292702dc95c466f3c3723854677bce1b579a841d137ec26447ade
-
SSDEEP
6144:1o3whi+1Py3V0a24kOn+Sr72iyjmhuKtUYiw52hVOcvBRMHkWYHpf:YKf1PyKa2anKjm3OYZ2hocvHt
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.165
218.54.31.226
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2080 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
uwduu.exevuzun.exepid process 1740 uwduu.exe 1984 vuzun.exe -
Loads dropped DLL 2 IoCs
Processes:
d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0.exeuwduu.exepid process 2208 d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0.exe 1740 uwduu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
vuzun.exepid process 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe 1984 vuzun.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0.exeuwduu.exedescription pid process target process PID 2208 wrote to memory of 1740 2208 d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0.exe uwduu.exe PID 2208 wrote to memory of 1740 2208 d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0.exe uwduu.exe PID 2208 wrote to memory of 1740 2208 d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0.exe uwduu.exe PID 2208 wrote to memory of 1740 2208 d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0.exe uwduu.exe PID 2208 wrote to memory of 2080 2208 d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0.exe cmd.exe PID 2208 wrote to memory of 2080 2208 d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0.exe cmd.exe PID 2208 wrote to memory of 2080 2208 d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0.exe cmd.exe PID 2208 wrote to memory of 2080 2208 d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0.exe cmd.exe PID 1740 wrote to memory of 1984 1740 uwduu.exe vuzun.exe PID 1740 wrote to memory of 1984 1740 uwduu.exe vuzun.exe PID 1740 wrote to memory of 1984 1740 uwduu.exe vuzun.exe PID 1740 wrote to memory of 1984 1740 uwduu.exe vuzun.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0.exe"C:\Users\Admin\AppData\Local\Temp\d84041eca0858276599f1048ad508174f1c7b921b515d2e479ac6bf2af0092c0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\uwduu.exe"C:\Users\Admin\AppData\Local\Temp\uwduu.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\vuzun.exe"C:\Users\Admin\AppData\Local\Temp\vuzun.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_uinsey.batFilesize
340B
MD5d8d32f009fabd581949daf20760a0771
SHA1d7866caf29c9ae663fc25df9a27cd78ed54427ed
SHA256418bcf5544a11af04be49a29d2828a16b5dac2f9766db1c17e9cf3a3f6d327f8
SHA512a702b075baa7f65e1e8ef0ed12099e4a5b872b182eb6720be33fb94c59cbf2d47ae40bad514eebf222fe7a353e938ee32a4321c7fc4e918c900167da3f65a31a
-
C:\Users\Admin\AppData\Local\Temp\golfinfo.iniFilesize
512B
MD5c67f898a344702747717e8c66ff94a4b
SHA10c7439a5811b66c46a5bd75644a9ee16b96f8546
SHA25632ffa30660e9341f27978b86739ea3388ecb5be51f1082cbff870915fa20674b
SHA512f821b5eb5cd67e804601062a9e99f59b844dcbea9d7893748853643d689d979ddc56a3f2f660e67b426d28125652be9050e265e25b57ce29a29fe95291702874
-
\Users\Admin\AppData\Local\Temp\uwduu.exeFilesize
368KB
MD52c1be357ec900e6def485c90210873a6
SHA152407acdf7e4067094589bcb407aa14f5788b979
SHA25696ea9e6d3e143e5b5c442b03c19cbf59fd3fe32f0c0378b32c85f74a4cc24845
SHA512a2e3657a3762f957aad1a195181321b6c4cb46de6b4ab2c11783fa1b4e8c636e3cbda9ed8c845fc1dfbc8c8646a98aaea8cbf6e272d901d1da20b46768418542
-
\Users\Admin\AppData\Local\Temp\vuzun.exeFilesize
208KB
MD51b4370cd1785fefbd6493d5b80ac625d
SHA17c36fe984876d421371741dc923b682dc16be6bb
SHA2562849fa730629e9cc84fa172014c0b7bd875e9787f3d74737939b77d7e39def79
SHA5120382af2c076756acedf333b516890ab7d8a722346730fb82676a85c3b2a64d407c03486222cda5b1272e4ed53a8396e5a719e69ef5a9498265b3bf974037962d
-
memory/1740-23-0x0000000000D80000-0x0000000000DE2000-memory.dmpFilesize
392KB
-
memory/1740-31-0x00000000033D0000-0x0000000003483000-memory.dmpFilesize
716KB
-
memory/1740-13-0x0000000000D80000-0x0000000000DE2000-memory.dmpFilesize
392KB
-
memory/1740-30-0x0000000000D80000-0x0000000000DE2000-memory.dmpFilesize
392KB
-
memory/1984-35-0x0000000001330000-0x00000000013E3000-memory.dmpFilesize
716KB
-
memory/1984-32-0x0000000001330000-0x00000000013E3000-memory.dmpFilesize
716KB
-
memory/1984-34-0x0000000001330000-0x00000000013E3000-memory.dmpFilesize
716KB
-
memory/1984-36-0x0000000001330000-0x00000000013E3000-memory.dmpFilesize
716KB
-
memory/1984-37-0x0000000001330000-0x00000000013E3000-memory.dmpFilesize
716KB
-
memory/1984-38-0x0000000001330000-0x00000000013E3000-memory.dmpFilesize
716KB
-
memory/2208-1-0x0000000000390000-0x00000000003F2000-memory.dmpFilesize
392KB
-
memory/2208-0-0x0000000000390000-0x00000000003F2000-memory.dmpFilesize
392KB
-
memory/2208-9-0x0000000002260000-0x00000000022C2000-memory.dmpFilesize
392KB
-
memory/2208-20-0x0000000000390000-0x00000000003F2000-memory.dmpFilesize
392KB