Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 09:58
Behavioral task
behavioral1
Sample
b98277fe00400f2cc998191a71fff5f02b8046c72eef3d5e7e9199f887017b57N.exe
Resource
win7-20240903-en
General
-
Target
b98277fe00400f2cc998191a71fff5f02b8046c72eef3d5e7e9199f887017b57N.exe
-
Size
84KB
-
MD5
2e24f445b7495fbe71936fa1bc16a240
-
SHA1
f5e2ccf7794e1b214806e718bcdbca8990d453e0
-
SHA256
b98277fe00400f2cc998191a71fff5f02b8046c72eef3d5e7e9199f887017b57
-
SHA512
e421b7bd5795c926e78d5016168b16eb045c0f58b95c3e3d2fbf2e48abfbdd64d9530fb323ee6fcd102188ca1eba013388cf6b20dfa3a137af85f7ca691f979d
-
SSDEEP
1536:Jz+jIHNv+vsFbwW6dk0QeLb4NMHriBRxiDkURP:JznH976dUCnuniDz
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Deletes itself 1 IoCs
pid Process 2300 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 572 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 2308 b98277fe00400f2cc998191a71fff5f02b8046c72eef3d5e7e9199f887017b57N.exe -
resource yara_rule behavioral1/memory/2308-0-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral1/files/0x0009000000017491-4.dat upx behavioral1/memory/2308-18-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral1/memory/572-21-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral1/memory/572-23-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral1/memory/572-30-0x0000000000400000-0x0000000000431000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b98277fe00400f2cc998191a71fff5f02b8046c72eef3d5e7e9199f887017b57N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2308 wrote to memory of 572 2308 b98277fe00400f2cc998191a71fff5f02b8046c72eef3d5e7e9199f887017b57N.exe 31 PID 2308 wrote to memory of 572 2308 b98277fe00400f2cc998191a71fff5f02b8046c72eef3d5e7e9199f887017b57N.exe 31 PID 2308 wrote to memory of 572 2308 b98277fe00400f2cc998191a71fff5f02b8046c72eef3d5e7e9199f887017b57N.exe 31 PID 2308 wrote to memory of 572 2308 b98277fe00400f2cc998191a71fff5f02b8046c72eef3d5e7e9199f887017b57N.exe 31 PID 2308 wrote to memory of 2300 2308 b98277fe00400f2cc998191a71fff5f02b8046c72eef3d5e7e9199f887017b57N.exe 32 PID 2308 wrote to memory of 2300 2308 b98277fe00400f2cc998191a71fff5f02b8046c72eef3d5e7e9199f887017b57N.exe 32 PID 2308 wrote to memory of 2300 2308 b98277fe00400f2cc998191a71fff5f02b8046c72eef3d5e7e9199f887017b57N.exe 32 PID 2308 wrote to memory of 2300 2308 b98277fe00400f2cc998191a71fff5f02b8046c72eef3d5e7e9199f887017b57N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b98277fe00400f2cc998191a71fff5f02b8046c72eef3d5e7e9199f887017b57N.exe"C:\Users\Admin\AppData\Local\Temp\b98277fe00400f2cc998191a71fff5f02b8046c72eef3d5e7e9199f887017b57N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:572
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5a01dba4c45102fc15292fd5591166536
SHA1d96191c30e0f09439d8547f4ededbf6726ccd54b
SHA256cc2f9d3db04690b746c18d40c70f8dbc9ca18520b68619d9ccaeac500af98904
SHA512277a86f44c2648668205cd6c3c9f83feef147a5ad10839a130713eee9c931c26088d4dd95798b1d0e69f3439239abdee79d37656ad3963147a878a9433d60d32
-
Filesize
340B
MD5d00458b79e2c2ad1c27f0819fc1afe48
SHA10608d75f1b1975a65a75001c9b5aec43c7e59f71
SHA2561c8ad014ee00ef5b3481f808f63623001c8beb2a2696a3f07257238212fc941a
SHA512ac1e0531f4f008660f031013ca1925692d5864b24cb2558461bc6557b42eb6b502d12903e15bd650cf13618243a573f27265bbc80f19f0925be77328bd735cc7
-
Filesize
84KB
MD5ebca273431909853ca339c66f5d4f6ba
SHA12f0c503e48b2bc179441303c25859a77f2fd3908
SHA256d7b271cb2a528da279145ad2d013dc210f84b458bc29f67b213f2c3499eec3c9
SHA5128404e0234ac6828df2d4512539c36f1dbdc2b2bb3e65db5f9e02f3ca3db15281a8d7e857ac81e1c238c32b9ca907e83643fcfd8ef9ee8b250e6036d6303d7fdb