Analysis
-
max time kernel
149s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 04:38
Static task
static1
Behavioral task
behavioral1
Sample
c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe
Resource
win7-20240708-en
General
-
Target
c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe
-
Size
332KB
-
MD5
aece7a093e6b27c5f1474cd8422c9e66
-
SHA1
eeb0ba66278e98a2241a3cd19d317007575c6578
-
SHA256
c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139
-
SHA512
3e94f42fb41f5cb3384f8e23b75d1539c9cd2bd5aa2aff2d9a5c1cd5496b8cd2493f22c76da08b516aed689b62d025028d29c4f98c2487f80017e3c4b9b612aa
-
SSDEEP
6144:yty5fbpxDuMcHYwt1gxloqtaE5iWbUMqfn8EijRUNafrHBw/iq:ytCLD7+51gxeq3gOU9EEQrhMJ
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2028 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
opcia.exereykha.exejebuy.exepid process 2408 opcia.exe 2812 reykha.exe 1376 jebuy.exe -
Loads dropped DLL 5 IoCs
Processes:
c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exeopcia.exereykha.exepid process 2908 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe 2908 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe 2408 opcia.exe 2408 opcia.exe 2812 reykha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exejebuy.exec1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exeopcia.exereykha.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jebuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language opcia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reykha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
Processes:
jebuy.exepid process 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe 1376 jebuy.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exeopcia.exereykha.exedescription pid process target process PID 2908 wrote to memory of 2408 2908 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe opcia.exe PID 2908 wrote to memory of 2408 2908 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe opcia.exe PID 2908 wrote to memory of 2408 2908 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe opcia.exe PID 2908 wrote to memory of 2408 2908 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe opcia.exe PID 2908 wrote to memory of 2028 2908 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe cmd.exe PID 2908 wrote to memory of 2028 2908 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe cmd.exe PID 2908 wrote to memory of 2028 2908 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe cmd.exe PID 2908 wrote to memory of 2028 2908 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe cmd.exe PID 2408 wrote to memory of 2812 2408 opcia.exe reykha.exe PID 2408 wrote to memory of 2812 2408 opcia.exe reykha.exe PID 2408 wrote to memory of 2812 2408 opcia.exe reykha.exe PID 2408 wrote to memory of 2812 2408 opcia.exe reykha.exe PID 2812 wrote to memory of 1376 2812 reykha.exe jebuy.exe PID 2812 wrote to memory of 1376 2812 reykha.exe jebuy.exe PID 2812 wrote to memory of 1376 2812 reykha.exe jebuy.exe PID 2812 wrote to memory of 1376 2812 reykha.exe jebuy.exe PID 2812 wrote to memory of 540 2812 reykha.exe cmd.exe PID 2812 wrote to memory of 540 2812 reykha.exe cmd.exe PID 2812 wrote to memory of 540 2812 reykha.exe cmd.exe PID 2812 wrote to memory of 540 2812 reykha.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe"C:\Users\Admin\AppData\Local\Temp\c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\opcia.exe"C:\Users\Admin\AppData\Local\Temp\opcia.exe" hi2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\reykha.exe"C:\Users\Admin\AppData\Local\Temp\reykha.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\jebuy.exe"C:\Users\Admin\AppData\Local\Temp\jebuy.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:540
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5e3c07938cd77830b2a184a14c8d88008
SHA166de4e4665ae56fa8015c73f5be3703c763dae71
SHA2569e9d2ed9ea8bb286a1d10c62270c70181c5dcd452b432700dceed777c8b8ad02
SHA5128a001ab8b6d75e58bd80c0d1e357794f4c77e4959a47ed69d22273d17e6f7b100677cfb76d327cf10314016fe3784c529afcb57e54e205d455354ea8098539a1
-
Filesize
224B
MD559634d3cd855bc1252a647bd2217bcc2
SHA1dde545ef9ec7525430a01a2b2c5d81b7339cfb9c
SHA256e8969a313b5cea1db86140ac4fcdbeb88ecb4d406dd8207a6842b757ceb189ed
SHA512e4ca394d5a36007f0398d1fc6a110a93937fc50c59ce66b7d7ce3c126391c8a22f8e692a22abefedc2d2b65652547203adb2ecc9f47eec6dc61cf35f5ad7059e
-
Filesize
512B
MD5fd51923ff03982fea59c0b92c5b2b8a0
SHA1707ea30afb7e286a063ea56d11e646586cbaec4f
SHA25616f41a3b4158405e30645727910fa70a9ccff8a41c650b34251840713e89043e
SHA512c7d1cd85b348391a42907cf02d424417c05e7bf78dcc78206d077cdbd1a0db96a2a58fca31e1355064304f1bf693640057b8531f70c1bc92ac10fe3f1f93d0cb
-
Filesize
223KB
MD52ba483e56a39258f4f4716aa366a6284
SHA1cd6680ca3072d634bf82d384b53c2cb560e19f4d
SHA2560b0c298f571019d483663d346d666b5edb98c3f7c95dda441e0fa376b956cf26
SHA512ef11edde6e3cd42e20a6ae4487c2f0d16f2092f9c9826e90a3376ee49f1eda74e37ff5b1f534b8b2f3d66de011c0fe843c7965f43074f4331921320ddd7e31c0
-
Filesize
332KB
MD5591fe8982359c9f3e1ad74c7227c9485
SHA1b6f2ce98d23445d31e7680f9e94f161b295f4a05
SHA2562b195f51a9694c983ed84630e7a97fcdfa42dfe7663e126ee245d7f102e0f747
SHA5128e0562bd057d636f28bc92a9db61b3ca04d72faddc7f33153b6acbb10b61c488b7d1583f401dc019356d03c1de7081881b69f02cc0138bfd830cf1072878bebd
-
Filesize
332KB
MD585fe47812543713dc9321e526b592ba0
SHA14181180fac6e4c054b53d560d45df4865c8d013d
SHA256bbfcbcff938084e6f4813dfaa35a984ff07c1a0b204e66ff5a2b6af3acbee091
SHA5123989a5700cf03241e4cd26fff265011e6d33c038506904ff2ab662d0d36a42732a5cc57ab1b867cfcaec06a55caceede41594e1b02de5ea8a881e93acf3c77bc