Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 03:30
Static task
static1
Behavioral task
behavioral1
Sample
699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exe
Resource
win7-20240708-en
General
-
Target
699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exe
-
Size
338KB
-
MD5
4b618ee7eb34d9776481ce7809bf23c0
-
SHA1
50be72c1861ba577f12872fe5f068a674afe91c3
-
SHA256
699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c
-
SHA512
58ef134e82912754e09775b9ebdb99828cf81fc8a432e3f20e015e0ed4ad98fcf6fbca9127fe0a6b64099868e4ca1785a6d8c47d7ac853081e4392b800911110
-
SSDEEP
6144:i5tYTzqklVw910CIWrC9foCChVN6XCLWk6aMWgziMV1AXj16NYuLDuUcOibi5EB9:iUPTCBC9A/VIXCCkMWguMcj0vbd5E0/O
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2080 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
rigav.exebigos.exepid process 1928 rigav.exe 1484 bigos.exe -
Loads dropped DLL 2 IoCs
Processes:
699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exerigav.exepid process 2348 699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exe 1928 rigav.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bigos.exe699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exerigav.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bigos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rigav.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
Processes:
bigos.exepid process 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe 1484 bigos.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exerigav.exedescription pid process target process PID 2348 wrote to memory of 1928 2348 699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exe rigav.exe PID 2348 wrote to memory of 1928 2348 699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exe rigav.exe PID 2348 wrote to memory of 1928 2348 699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exe rigav.exe PID 2348 wrote to memory of 1928 2348 699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exe rigav.exe PID 2348 wrote to memory of 2080 2348 699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exe cmd.exe PID 2348 wrote to memory of 2080 2348 699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exe cmd.exe PID 2348 wrote to memory of 2080 2348 699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exe cmd.exe PID 2348 wrote to memory of 2080 2348 699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exe cmd.exe PID 1928 wrote to memory of 1484 1928 rigav.exe bigos.exe PID 1928 wrote to memory of 1484 1928 rigav.exe bigos.exe PID 1928 wrote to memory of 1484 1928 rigav.exe bigos.exe PID 1928 wrote to memory of 1484 1928 rigav.exe bigos.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exe"C:\Users\Admin\AppData\Local\Temp\699128c70cc5be077b4dfa9b30776b3f7735fa678da85284c671c5654c94609c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\rigav.exe"C:\Users\Admin\AppData\Local\Temp\rigav.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\bigos.exe"C:\Users\Admin\AppData\Local\Temp\bigos.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5b3b09c9100c29bcb381bc1957e00318f
SHA1bf239a83e082208b0675faa439c4ff3007b5b922
SHA256cc20c0d1a9f95e9f2ae27a553f5b9c1899bd3e82a4097502ac8429e511f46e67
SHA512c88773cd2eabe688b87e505fe6d0b3dab8f6308a1872c88c9298c62636dab7a33bf6977b4ed4d2f4826a06ac19868d70dce44bc0a10819b40c1ac1e7b3893d9c
-
Filesize
512B
MD5465adbfe47cc4c751185c6d870056d82
SHA12f096d774fb5dae99d1849c27e81a04fec81f47d
SHA256561406f8073b97215c55ed8b34c83451cfb6c18ba9a6ca957aef9110910b4905
SHA512b7b5c21222fe872ed0cc5d5344f56723c3a0c27f6cab330dbc94ebfa2d178ca8679c5be0ceb55b51e166f7d86b9175411b9f302e793c8ef572eca472c527fc81
-
Filesize
226KB
MD5a094c8e49d17d563d229abcac805cbbf
SHA1052c720be6486e8502050f8ab7d8dd3420ff6ef0
SHA256f0072ac10904843c4a5777e4d959db4adf02a1af7ffe2b1aaf11d6abc4a825b7
SHA512b9216da7290b3d2af69754276ecfbe1be27af345f09c7651704857edd781ab9b76f9a2a5adfd42d1cf5d8e5051e21a48e2f213af0d4c5f1dc9c3a48ed120ba1d
-
Filesize
338KB
MD5b39fb500db37d0850bc1fc888461a91d
SHA1b08dfc30e551124731914fab225b6c31ce930697
SHA256480d43d9c734fd81cc5329901283d0dfb98fba7e3c153d2e679c7dc393cb9166
SHA512d750aa7cbe853c6103b19478215eb77638264026ab3c0845969f223bf200440db15439cc3daf629816658ac9e92b6e53db9fcf76fc75386a92ba68185a687642