Analysis
-
max time kernel
89s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
0d40c6ed3bb93766766f8e0e325acb20N.exe
Resource
win7-20240705-en
General
-
Target
0d40c6ed3bb93766766f8e0e325acb20N.exe
-
Size
56KB
-
MD5
0d40c6ed3bb93766766f8e0e325acb20
-
SHA1
e00a274d0ebe106424abeef8d72c29b2f86695e9
-
SHA256
0b1a8603ae89200d97744cfa54e666befe95a937c87d077fd98264bd45f9bd71
-
SHA512
487ebab1d6a439e4b13815bbeb949c860716566ec7989605c6fc532570305bbb9dfca434664a831a212aa8f25589e2153fcb21d400ddd934f1f17c1e36f5b696
-
SSDEEP
1536:vMcQYte55zs091Zw9FAGDdJYipvwGf9ogjrgHi:vMhAe5Zs091KI+JYixw49Xjrp
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2800 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
biudfw.exepid process 2308 biudfw.exe -
Loads dropped DLL 1 IoCs
Processes:
0d40c6ed3bb93766766f8e0e325acb20N.exepid process 2108 0d40c6ed3bb93766766f8e0e325acb20N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
0d40c6ed3bb93766766f8e0e325acb20N.exedescription pid process target process PID 2108 wrote to memory of 2308 2108 0d40c6ed3bb93766766f8e0e325acb20N.exe biudfw.exe PID 2108 wrote to memory of 2308 2108 0d40c6ed3bb93766766f8e0e325acb20N.exe biudfw.exe PID 2108 wrote to memory of 2308 2108 0d40c6ed3bb93766766f8e0e325acb20N.exe biudfw.exe PID 2108 wrote to memory of 2308 2108 0d40c6ed3bb93766766f8e0e325acb20N.exe biudfw.exe PID 2108 wrote to memory of 2800 2108 0d40c6ed3bb93766766f8e0e325acb20N.exe cmd.exe PID 2108 wrote to memory of 2800 2108 0d40c6ed3bb93766766f8e0e325acb20N.exe cmd.exe PID 2108 wrote to memory of 2800 2108 0d40c6ed3bb93766766f8e0e325acb20N.exe cmd.exe PID 2108 wrote to memory of 2800 2108 0d40c6ed3bb93766766f8e0e325acb20N.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d40c6ed3bb93766766f8e0e325acb20N.exe"C:\Users\Admin\AppData\Local\Temp\0d40c6ed3bb93766766f8e0e325acb20N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:2308
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5b4a86880004da8726288d7ec954885a8
SHA11bab1cfbdc2c540246210bc7852f8fe7e8357b31
SHA256c85016a9115aeb492bf116ab05791a9c3e6e30c39274767bd0476bd56a37db46
SHA51222758f6c6de591c99f8f9857c1b03e55c242f0a4987d376b08c30bc608027d1574a228a8230099ddac2a3214663396b016e85d085204155a5ec26f87a28496b4
-
Filesize
276B
MD51862e68ee220fca16fb7cdb1a4b04683
SHA1125d071224d1d875b818f1dbc09c59d416aa9a75
SHA2564f3a3113913d3b0da973a9fe0d5dc33520375a6c6b7dc87eff19991f8f043b1e
SHA51290a0b0e6949dd8c41839d1f6cf355de7d9c53e2d385d19c8e5a39b4db8b1802688cd505968d151cc2224d0cf7bde9cef82bb963bb27b34baf631d1657cdc792b
-
Filesize
56KB
MD51b7662002fedd68a4517e271094ad52a
SHA1039bd715a0be727fdd61598c7fa776b8793c041c
SHA256afd7b9c51979e5fb100dafcb43962f505f6a37647c8cb096fd31c923111e7727
SHA512a3204ec11db23398103e8b496adf5c72ded1f30bdef3583f6a5e8ef39b0d95dcf3eb33fb13bb61ce9b1fee17ad698ad7b4c44dc9531a0ec1406f9222a2286e56