Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 04:33
Static task
static1
Behavioral task
behavioral1
Sample
8e9a28e111ea671d25fa85f6543a4ebcdbb76c38ca05b9e5092846c4b065a814N.exe
Resource
win7-20240903-en
General
-
Target
8e9a28e111ea671d25fa85f6543a4ebcdbb76c38ca05b9e5092846c4b065a814N.exe
-
Size
328KB
-
MD5
806e6a26699a3546344b9ff86ae56dd0
-
SHA1
fc102e45eabc6122eb62611967a8bc7ca6838b86
-
SHA256
8e9a28e111ea671d25fa85f6543a4ebcdbb76c38ca05b9e5092846c4b065a814
-
SHA512
265403dcab08e465312a3130918c41ed7e811b3c736664e00cfb6411e0ac6046425e5afd21c4eb6067e9085425781cccb63e9fea85daead22e1b0cc4174cbf67
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYE:vHW138/iXWlK885rKlGSekcj66cix
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Deletes itself 1 IoCs
pid Process 1644 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3012 vyfeq.exe 2856 upkid.exe -
Loads dropped DLL 2 IoCs
pid Process 2752 8e9a28e111ea671d25fa85f6543a4ebcdbb76c38ca05b9e5092846c4b065a814N.exe 3012 vyfeq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e9a28e111ea671d25fa85f6543a4ebcdbb76c38ca05b9e5092846c4b065a814N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vyfeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upkid.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe 2856 upkid.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2752 wrote to memory of 3012 2752 8e9a28e111ea671d25fa85f6543a4ebcdbb76c38ca05b9e5092846c4b065a814N.exe 30 PID 2752 wrote to memory of 3012 2752 8e9a28e111ea671d25fa85f6543a4ebcdbb76c38ca05b9e5092846c4b065a814N.exe 30 PID 2752 wrote to memory of 3012 2752 8e9a28e111ea671d25fa85f6543a4ebcdbb76c38ca05b9e5092846c4b065a814N.exe 30 PID 2752 wrote to memory of 3012 2752 8e9a28e111ea671d25fa85f6543a4ebcdbb76c38ca05b9e5092846c4b065a814N.exe 30 PID 2752 wrote to memory of 1644 2752 8e9a28e111ea671d25fa85f6543a4ebcdbb76c38ca05b9e5092846c4b065a814N.exe 31 PID 2752 wrote to memory of 1644 2752 8e9a28e111ea671d25fa85f6543a4ebcdbb76c38ca05b9e5092846c4b065a814N.exe 31 PID 2752 wrote to memory of 1644 2752 8e9a28e111ea671d25fa85f6543a4ebcdbb76c38ca05b9e5092846c4b065a814N.exe 31 PID 2752 wrote to memory of 1644 2752 8e9a28e111ea671d25fa85f6543a4ebcdbb76c38ca05b9e5092846c4b065a814N.exe 31 PID 3012 wrote to memory of 2856 3012 vyfeq.exe 34 PID 3012 wrote to memory of 2856 3012 vyfeq.exe 34 PID 3012 wrote to memory of 2856 3012 vyfeq.exe 34 PID 3012 wrote to memory of 2856 3012 vyfeq.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e9a28e111ea671d25fa85f6543a4ebcdbb76c38ca05b9e5092846c4b065a814N.exe"C:\Users\Admin\AppData\Local\Temp\8e9a28e111ea671d25fa85f6543a4ebcdbb76c38ca05b9e5092846c4b065a814N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\vyfeq.exe"C:\Users\Admin\AppData\Local\Temp\vyfeq.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\upkid.exe"C:\Users\Admin\AppData\Local\Temp\upkid.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5d4f89033836f69ba1149587b91f3f401
SHA15d9f9b0ffa292d6771effd0b9ec4b0372fbbe764
SHA256b0aac222ed1e3b18b5c4a4c019e5d60daa41ec493d2ccbb831c353b6b26f08b1
SHA512903884f9635fc683b132ff27354e47de935215c8ead2781302d63d725167711d0e573f66bbf362f4c191cdf2aa09846cd122be63fbcbc14a33ee3532831fad54
-
Filesize
512B
MD5a536348cc6122573922e2ce2d89cdd08
SHA180864bfa02399e278ecaa57235bbf985eb5ab2c2
SHA256244b3efdf1432e97914fb45299abcbe4d4bf2b5aac7808b63c18ba886790961d
SHA512f558e53dc03ff4e75788308004e147a02e0ec16efb30ef6c8518e5b83c07e4a2841c04c076ffe0846ead5153fe4a89cdd5fbff51409ccbb62ee3105b9c6fb4bc
-
Filesize
172KB
MD5cc763db1dcd710ca378067f2fdc23b60
SHA1f2e071005ab47f93aae9dd3df9936ba102e1a0b2
SHA2562f52003ed01c20d68d6bce27ada1674f9d60058b6c0e9cf848981063b334e051
SHA51246ae641363728968cd9ecd6a855f9ebb7ebacdb45fc515473241945d0089398c7c0eb6530008352eae69eb9aaaff9fdfc3dfd1ceb2d22b112d15c0e7fe0303b1
-
Filesize
328KB
MD58093b3cfe992733a07d329ec0967f58a
SHA1edc7fec6b17777a96559912151dbd7fe8db271ca
SHA2568db611243abe0287521c788612ae98acdf4069b28eccc42bad16179ee4f8d6d2
SHA512c7f3817baaf687297ee972f10d7ba412b45224e3840d7665ed36774e2f9ebd3d65b6f595bfa7b0e7f2d566fb3a29963d93638b085f6be351a568c8857199e6c1