Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 21:55
Static task
static1
Behavioral task
behavioral1
Sample
17f662c3625667180de515e38991f200N.exe
Resource
win7-20240708-en
General
-
Target
17f662c3625667180de515e38991f200N.exe
-
Size
323KB
-
MD5
17f662c3625667180de515e38991f200
-
SHA1
91e50623179d3493446695997673fc49481f6906
-
SHA256
77e68befe0ae0a15e4175a05b8bc5fa893c61c369b9f4e0c28bffbb3065d4d9a
-
SHA512
cfcc7a751970fb9aa752c02589073620e5e0ac5ccbc0af3200050d9732b8cf1bb33825064c43195f8a302d3c170cdb2436614f26934cbf27160aaa691a97c1de
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYe:vHW138/iXWlK885rKlGSekcj66cir
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2736 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
fihyq.exexitus.exepid process 2464 fihyq.exe 2064 xitus.exe -
Loads dropped DLL 2 IoCs
Processes:
17f662c3625667180de515e38991f200N.exefihyq.exepid process 784 17f662c3625667180de515e38991f200N.exe 2464 fihyq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
xitus.exepid process 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe 2064 xitus.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
17f662c3625667180de515e38991f200N.exefihyq.exedescription pid process target process PID 784 wrote to memory of 2464 784 17f662c3625667180de515e38991f200N.exe fihyq.exe PID 784 wrote to memory of 2464 784 17f662c3625667180de515e38991f200N.exe fihyq.exe PID 784 wrote to memory of 2464 784 17f662c3625667180de515e38991f200N.exe fihyq.exe PID 784 wrote to memory of 2464 784 17f662c3625667180de515e38991f200N.exe fihyq.exe PID 784 wrote to memory of 2736 784 17f662c3625667180de515e38991f200N.exe cmd.exe PID 784 wrote to memory of 2736 784 17f662c3625667180de515e38991f200N.exe cmd.exe PID 784 wrote to memory of 2736 784 17f662c3625667180de515e38991f200N.exe cmd.exe PID 784 wrote to memory of 2736 784 17f662c3625667180de515e38991f200N.exe cmd.exe PID 2464 wrote to memory of 2064 2464 fihyq.exe xitus.exe PID 2464 wrote to memory of 2064 2464 fihyq.exe xitus.exe PID 2464 wrote to memory of 2064 2464 fihyq.exe xitus.exe PID 2464 wrote to memory of 2064 2464 fihyq.exe xitus.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17f662c3625667180de515e38991f200N.exe"C:\Users\Admin\AppData\Local\Temp\17f662c3625667180de515e38991f200N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\fihyq.exe"C:\Users\Admin\AppData\Local\Temp\fihyq.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\xitus.exe"C:\Users\Admin\AppData\Local\Temp\xitus.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2064 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD5d02b31cff146b76b26c598b6a9c30016
SHA1da5f3b1fa9bd330b622143d984ad4a31898b5ffb
SHA256e751b0a8272716fbe8152bb15b1cff9e66d7fac9f03139f6dae581fc1d6a345b
SHA512a02301efd8887e7500cd9add8a34445bb0da11edd39a7400eb5679655b48eb426fbca9173ceed54a953b35fe9953181b098cf7c8b069a0989ba7b707bb46f3d4
-
Filesize
512B
MD5ab6ae133d78b6ad21f830b2d7b9b8feb
SHA13e5ac88c967331d37559130f260b39679ae22854
SHA256de163efeb3081e16f29a201042b9a29274369c0112996da638643597dca60377
SHA512059b845a8017f485ce8c4177a411dd684c02af65f9c9549dfcc74ab8e5f61b9a69d9b4ab84de4b54fb37db5c36fab3f7a3d71315502313b73c029b51eb6f7b63
-
Filesize
323KB
MD5e312130f53da3da11b444aab5b9b1f5d
SHA127967fa888d007a5cd625480c12e5f93be43fc1d
SHA256c76e1a38fa547c0c51194d3ba3bb8bace2eabd8b9cbff23ce9fdc37071414758
SHA5121165220560a836903ac2c80b8e75112088fd19bc22d09a6dabcd2bc1eab7c16cdc53ed9bdca9e06db15ca498ea3210d6c85093c6e45c9136f3dc7c554cbe0136
-
Filesize
172KB
MD5cb44571c3b2c9657dd6b7c5121e291a1
SHA1ca916429ada7356d8e38eafc9a3f88e412490679
SHA256f6fd9749f3809639a2520463655e8d088bc42f734bb4d30db9f793895f4db9e0
SHA5122b209eacd4e949b84fd3f2cfde35aaeaeca99351c31942628cf7f0061a602ae9d7410841910ed45c3db592e255ff9fffdf332e82b7d754c67ac6fb3e24241628