Overview
overview
10Static
static
10[DemonArch...6d.exe
windows7-x64
10[DemonArch...87.exe
windows7-x64
10[DemonArch...4b.exe
windows7-x64
10[DemonArch...9e.exe
windows7-x64
10[DemonArch...ca.exe
windows7-x64
10[DemonArch...8c.exe
windows7-x64
10[DemonArch...1a.exe
windows7-x64
10[DemonArch...4c.exe
windows7-x64
10[DemonArch...c4.exe
windows7-x64
10[DemonArch...68.exe
windows7-x64
10[DemonArch...50.exe
windows7-x64
10[DemonArch...3e.exe
windows7-x64
10[DemonArch...8b.exe
windows7-x64
10[DemonArch...f0.exe
windows7-x64
10[DemonArch...e1.exe
windows7-x64
10[DemonArch...89.exe
windows7-x64
[DemonArch...e5.exe
windows7-x64
10[DemonArch...85.exe
windows7-x64
10[DemonArch...6b.exe
windows7-x64
10[DemonArch...d0.exe
windows7-x64
10[DemonArch...1e.exe
windows7-x64
10[DemonArch...25.exe
windows7-x64
[DemonArch...31.exe
windows7-x64
9[DemonArch...5f.exe
windows7-x64
10[DemonArch...d3.exe
windows7-x64
10[DemonArch...a5.exe
windows7-x64
10[DemonArch...bb.exe
windows7-x64
3[DemonArch...25.exe
windows7-x64
10[DemonArch...49.exe
windows7-x64
10[DemonArch...4c.exe
windows7-x64
10[DemonArch...ec.exe
windows7-x64
10[DemonArch...ae.exe
windows7-x64
10Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 17:15
Behavioral task
behavioral1
Sample
[DemonArchives]02602e9283805090b671a783870db86d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
[DemonArchives]0838231d7fbebe340c0ac71db0ef8c87.exe
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
[DemonArchives]0ad8190f1160f00fc831fb329262724b.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
[DemonArchives]0bcfb8285b7397bcfc2ffb92a6c5ec9e.exe
Resource
win7-20240508-en
Behavioral task
behavioral5
Sample
[DemonArchives]0dbf8f84a143e3e446242938dfd288ca.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
[DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exe
Resource
win7-20240419-en
Behavioral task
behavioral7
Sample
[DemonArchives]1443a4458c2b4af35c618a327b7c411a.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
[DemonArchives]15282a5c1d8e03a448ebc0b70e702a4c.exe
Resource
win7-20240508-en
Behavioral task
behavioral9
Sample
[DemonArchives]156c78364b84a89c8e61f444c3c620c4.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
[DemonArchives]15ff3ff6cb29ac4c66a558d101e37068.exe
Resource
win7-20240419-en
Behavioral task
behavioral11
Sample
[DemonArchives]18227e20a5e842198e7271ae54397150.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
[DemonArchives]1d957e984fcd6327f30f7006e2d11f3e.exe
Resource
win7-20240419-en
Behavioral task
behavioral13
Sample
[DemonArchives]1e2c3685399d381aa04ba4d70651e38b.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
[DemonArchives]291b00fb921e80b1cf7e8154693947f0.exe
Resource
win7-20240508-en
Behavioral task
behavioral15
Sample
[DemonArchives]2b961a5aadff93e0d87b42e530d5a0e1.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
[DemonArchives]2be60b607087d60c5353062345f97789.exe
Resource
win7-20240611-en
Behavioral task
behavioral17
Sample
[DemonArchives]2e23d0d084cd18f08897dfe509bdd4e5.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
[DemonArchives]2edac22166e0d82bc1c652e331726c85.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
[DemonArchives]31c25cdf7b77267744cdc37912e48d6b.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
[DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe
Resource
win7-20240419-en
Behavioral task
behavioral21
Sample
[DemonArchives]34172ec379dab98d177ab7e31d517b1e.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
[DemonArchives]4cf4cbd1bc2ef0ddfe3530541ffdd925.exe
Resource
win7-20231129-en
Behavioral task
behavioral23
Sample
[DemonArchives]54b9e4e56454226484e80fd01ca03131.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
[DemonArchives]9a4605cedcda1924728fbe58d429915f.exe
Resource
win7-20240220-en
Behavioral task
behavioral25
Sample
[DemonArchives]a2113a088085d07d2d7688ab2b0914d3.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
[DemonArchives]aa18a0770ed7d03bddfb00e126fbbba5.exe
Resource
win7-20240611-en
Behavioral task
behavioral27
Sample
[DemonArchives]ac7cf64a560bda15c281c43780b8d5bb.exe
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
[DemonArchives]af6fb7fbf240ae2f6490766919b26325.exe
Resource
win7-20231129-en
Behavioral task
behavioral29
Sample
[DemonArchives]b09a0cd1c32edf39308043eed7889449.exe
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
[DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe
Resource
win7-20240221-en
Behavioral task
behavioral31
Sample
[DemonArchives]b3c170550a1efdf268632916e95ad1ec.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
[DemonArchives]b83b3408e6ade0a5c61c5870208000ae.exe
Resource
win7-20240221-en
General
-
Target
[DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe
-
Size
394KB
-
MD5
b1d6b726bf6ac63749e5eba6b5c7694c
-
SHA1
277f12fb1583b2996f67dd8276df3f5db79cd1a6
-
SHA256
8ffef1554685604bf346da838d7d7477f9a9eecec52ce86a29e5db6c5cf6cc75
-
SHA512
62d271e31c9bd3fcc1708202d636ae3635afc1b922d048cdfe41c0f2fe509d2ba8c7f3586c1738a6ee7bfd8dce0910496104177b4239218d9c9960386e64d362
-
SSDEEP
6144:pzwArTEDSCs5wL0DKlpn/URBudL7qRBpkvfsModogZ/SvnDTH9QRO:pMmQDSCs5wo0e8L7qRbQUugennHGO
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2548 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
toajl.exeybrio.exepid process 296 toajl.exe 380 ybrio.exe -
Loads dropped DLL 2 IoCs
Processes:
[DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exetoajl.exepid process 2336 [DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe 296 toajl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
ybrio.exepid process 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe 380 ybrio.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
[DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exetoajl.exedescription pid process target process PID 2336 wrote to memory of 296 2336 [DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe toajl.exe PID 2336 wrote to memory of 296 2336 [DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe toajl.exe PID 2336 wrote to memory of 296 2336 [DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe toajl.exe PID 2336 wrote to memory of 296 2336 [DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe toajl.exe PID 2336 wrote to memory of 2548 2336 [DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe cmd.exe PID 2336 wrote to memory of 2548 2336 [DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe cmd.exe PID 2336 wrote to memory of 2548 2336 [DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe cmd.exe PID 2336 wrote to memory of 2548 2336 [DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe cmd.exe PID 296 wrote to memory of 380 296 toajl.exe ybrio.exe PID 296 wrote to memory of 380 296 toajl.exe ybrio.exe PID 296 wrote to memory of 380 296 toajl.exe ybrio.exe PID 296 wrote to memory of 380 296 toajl.exe ybrio.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\[DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe"C:\Users\Admin\AppData\Local\Temp\[DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\toajl.exe"C:\Users\Admin\AppData\Local\Temp\toajl.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ybrio.exe"C:\Users\Admin\AppData\Local\Temp\ybrio.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_uinsey.batFilesize
306B
MD5ce28fe0cf6e96268d06a194813d45267
SHA1fc7af643d652305d05a0b1aa3dd00e88e0c38cc2
SHA2566eb0f8cfc18eadd7eb89140e578033681df0908c61f218092ea0a3a9e059d01a
SHA51237e858153c4f6dfeaeebedcb9b5da907f71a603d1fc4e1508139e69e6ccce3a6f104c8e367c13bc48e9ad7679d8473a356b46ae514844252cd1e5f49fe56cc35
-
C:\Users\Admin\AppData\Local\Temp\golfinfo.iniFilesize
512B
MD56c21c90f2a0e4125e00b86df65db7cfc
SHA104d1716cd07605aad2954f2cd00126916a0ef648
SHA25654e20c62118409bba1bccf02eb04132bd44d17822c49f69e7f39b28f15f870a4
SHA5128d593b49c901eaf7c95bc74d2448e8f941c8b5d29230bbc5ac3e6b9f0af2fd938078576643d8b7e62668534caa9a1e4be1e83ce70a7b6762880139cd3a4d4781
-
C:\Users\Admin\AppData\Local\Temp\toajl.exeFilesize
394KB
MD5ca75486e7f7955828fa3aa4b3827a778
SHA1e2160effd11f6d82efa7c7b386796e281a6f09e7
SHA256f920873d9c11d423f3d363301d522f097956102c828db8d0cddd339c21f6a6c0
SHA512a602a561d3df8b2be625847b99312f433b49450c413aabf9777e3b9780bc2c2eac33818e344cc7a993109502e3255c1fb1a6c63021446fc14d1289fa25cfe5ca
-
C:\Users\Admin\AppData\Local\Temp\toajl.exeFilesize
394KB
MD534d037e0eaeeed2275dd356546250985
SHA1b5fdd96d5bb506d628a05e7c92227cbf56bcdb1d
SHA2561e011e7c96c3955420660a50dcbb58fe8a672d16aacfe4a974b6fd25b4ee1b83
SHA512b2b40efd3a795a9434bffd7f51ca996f6beb7df985951e11ef18ecdcc73858153bb5b1c817cde4d87e11021c1ab68a20b169a47d68379d986c35b9864a4976d4
-
\Users\Admin\AppData\Local\Temp\ybrio.exeFilesize
175KB
MD5f8560bb73fc09b32c67af30f726fa86a
SHA1e11e7326e196cf6f1506a2d3b652a75cc7d95e7e
SHA25639125b86831d7a7daa159ca0b4143af19be26e881a2f8a67973a1babfc8aa810
SHA5129237686f74fcdbacb08ab1bbe3bfadf3ea66b7e4a5ce482ca5f92d24ae6582b861acd340af2fb16d692f5a95e84d500980892ae9652b33da7b5ace7e5e773587
-
memory/296-11-0x0000000001180000-0x00000000011E5000-memory.dmpFilesize
404KB
-
memory/296-26-0x0000000001180000-0x00000000011E5000-memory.dmpFilesize
404KB
-
memory/380-32-0x0000000000130000-0x00000000001C0000-memory.dmpFilesize
576KB
-
memory/380-28-0x0000000000130000-0x00000000001C0000-memory.dmpFilesize
576KB
-
memory/380-31-0x0000000000130000-0x00000000001C0000-memory.dmpFilesize
576KB
-
memory/380-33-0x0000000000130000-0x00000000001C0000-memory.dmpFilesize
576KB
-
memory/380-34-0x0000000000130000-0x00000000001C0000-memory.dmpFilesize
576KB
-
memory/380-35-0x0000000000130000-0x00000000001C0000-memory.dmpFilesize
576KB
-
memory/2336-9-0x00000000006A0000-0x0000000000705000-memory.dmpFilesize
404KB
-
memory/2336-18-0x0000000000040000-0x00000000000A5000-memory.dmpFilesize
404KB
-
memory/2336-0-0x0000000000040000-0x00000000000A5000-memory.dmpFilesize
404KB