Analysis
-
max time kernel
140s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 06:09
Behavioral task
behavioral1
Sample
U89.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
U89.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral3
Sample
دعاء.doc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
دعاء.doc
Resource
win10v2004-20240802-en
General
-
Target
U89.exe
-
Size
212KB
-
MD5
f556271e1338dfc224cbebf6fe8f8eae
-
SHA1
054f755a4037ba3bc4c17a5f4c681a1204f35e0d
-
SHA256
a70560275b6f6e9586a30f473b01f2584717df66a338204c696b55aa9994ca59
-
SHA512
5f6c89c1544110d4039b4d814618f18ffd341c1c057ea9837006ab858187164e9d8f2910cdd133696a20bdbe2a2fb351b7c0e8c4d02693cd436ab7a88e7915d0
-
SSDEEP
3072:obhW6ZNK8kxbvM6qVYqQyYOmaq63Ckl+GPDJNn6lsJ9t57OGskwuZ53lWQMEdFFH:o8c18vM64LYOmaq6TIS6lyX7Tp/1Zv
Malware Config
Signatures
-
Unexpected DNS network traffic destination 11 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 210.144.5.163 Destination IP 141.161.200.201 Destination IP 203.234.132.1 Destination IP 203.139.161.37 Destination IP 57.68.16.13 Destination IP 198.231.24.101 Destination IP 129.82.100.64 Destination IP 66.54.140.10 Destination IP 129.22.4.1 Destination IP 209.75.26.6 Destination IP 128.192.1.193 -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 U89.exe -
resource yara_rule behavioral1/memory/2104-0-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2104-3-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2104-4-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2104-14-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2104-26-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2104-27-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2104-34-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2104-35-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2104-42-0x0000000000400000-0x0000000000465000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U89.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 U89.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 U89.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe 2104 U89.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5ca2061fac79d5c50e7f7475e8922d0e0
SHA16a0d0627e0fb1478e4c0bf05e31a39715b00b8f2
SHA2563a61bd5b54064b53e985c644df8f2dfc5e27b2299164bf45bc56540c0b2582ac
SHA5128e30f669c53f15a5190fafa6a326fe8ee871713ef1b51154fc74501960fe36b03f4a2d15ae1351b786ccdbc6b6ef98b6b374310121c387dc671a38b3af8722ca