Analysis
-
max time kernel
90s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 05:32
Behavioral task
behavioral1
Sample
5272bc5f1c4a7b86a4cf34549854fbd0N.exe
Resource
win7-20240704-en
General
-
Target
5272bc5f1c4a7b86a4cf34549854fbd0N.exe
-
Size
274KB
-
MD5
5272bc5f1c4a7b86a4cf34549854fbd0
-
SHA1
0f505f135bc475e68be4252dc8d7e3cb67f9b90f
-
SHA256
571a83935f655bebd154e20b639493e5b1df5802756cff2cbb0889487be7186d
-
SHA512
7793cccd00cd9c7bec08741a21a0cba22b6ef3675ffafc4d0599cad68f7263441a7a00310ec2b65eb1df8fa3bbba534b439b21bdbc33463a61e5aa3e0d7c4e26
-
SSDEEP
3072:pp56zRJ83+OJ7NoGvdwWy6k04yW/KME0jj0wA4:pOzRWu27dlOd5W0I4
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Deletes itself 1 IoCs
pid Process 2940 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2180 biudfw.exe -
Loads dropped DLL 1 IoCs
pid Process 1140 5272bc5f1c4a7b86a4cf34549854fbd0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2180 1140 5272bc5f1c4a7b86a4cf34549854fbd0N.exe 30 PID 1140 wrote to memory of 2180 1140 5272bc5f1c4a7b86a4cf34549854fbd0N.exe 30 PID 1140 wrote to memory of 2180 1140 5272bc5f1c4a7b86a4cf34549854fbd0N.exe 30 PID 1140 wrote to memory of 2180 1140 5272bc5f1c4a7b86a4cf34549854fbd0N.exe 30 PID 1140 wrote to memory of 2940 1140 5272bc5f1c4a7b86a4cf34549854fbd0N.exe 31 PID 1140 wrote to memory of 2940 1140 5272bc5f1c4a7b86a4cf34549854fbd0N.exe 31 PID 1140 wrote to memory of 2940 1140 5272bc5f1c4a7b86a4cf34549854fbd0N.exe 31 PID 1140 wrote to memory of 2940 1140 5272bc5f1c4a7b86a4cf34549854fbd0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5272bc5f1c4a7b86a4cf34549854fbd0N.exe"C:\Users\Admin\AppData\Local\Temp\5272bc5f1c4a7b86a4cf34549854fbd0N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:2180
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5ac5e84ed8031d66a9fcd5e472ba8091b
SHA106303add604104d6abbb69458f89773c066b470c
SHA2563a3cfa6f4786dab0ac8bc76204948f32a3a2cbd094922f87c251ec80d22baae5
SHA5127bf829102a70a1304dae435b8ae3c9ef9a925af7e995fe381d80730f4f702e1fd2a0a1b6a3a4b4667925f5bb95c897166a8fc0f52d3171d9cdba0bf09b53f152
-
Filesize
276B
MD538afe14e71e56513bcaa24ebb82a5702
SHA1e314c4eccf629dbd89ad70a645213195adc24862
SHA256e5973a3692cb61b42c285c58fdf88f542acfe9878021ee9f9b03191b7ae73248
SHA51290648ad1db68839707ee87631925206a7297c0b604d0ba17b9da0fdbb41d2bca63bf2a2fde9322b18b42b7e8754e1baeeeb4b6914afa807efaf5b9c5a230af11
-
Filesize
274KB
MD59f22f0877493f957c1fd57d4f2cc99ff
SHA18b6d80d40b1463d655e83c2169fe118c17401884
SHA256ea157f6bdc5716c50026cd1200affc9e90cc86a0859085d316d9605e98affc50
SHA512c0d8ba4de009b7a567f852fed01785ee7a842d460ba05775566feb7fd92cbfa5fbe3b0bd43495360ea15909bb8af1ad71e3fbdc48ff990f18c4486813ab9345c