Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 00:53
Static task
static1
Behavioral task
behavioral1
Sample
965ba28048f83c5fd444603933420e9d22f46f9e20709c03850a9a5824659fda.exe
Resource
win7-20241010-en
General
-
Target
965ba28048f83c5fd444603933420e9d22f46f9e20709c03850a9a5824659fda.exe
-
Size
331KB
-
MD5
04585503f45c29d7aed015e16dfe1682
-
SHA1
59536b0d44f93421d6179d63866f9d49fc83d6f5
-
SHA256
965ba28048f83c5fd444603933420e9d22f46f9e20709c03850a9a5824659fda
-
SHA512
beaed660a7fd8123b30c2610e16dca0f488b4f292d85e0eafa418a1cb1f02a47be68c00c9277a10664d31e01797f24fa7aaeb31afed09143ec55406adfe4eb22
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYN:vHW138/iXWlK885rKlGSekcj66ciw
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Deletes itself 1 IoCs
pid Process 2884 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2152 puxor.exe 3000 fivib.exe -
Loads dropped DLL 2 IoCs
pid Process 2128 965ba28048f83c5fd444603933420e9d22f46f9e20709c03850a9a5824659fda.exe 2152 puxor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 965ba28048f83c5fd444603933420e9d22f46f9e20709c03850a9a5824659fda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puxor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fivib.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
pid Process 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe 3000 fivib.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2152 2128 965ba28048f83c5fd444603933420e9d22f46f9e20709c03850a9a5824659fda.exe 30 PID 2128 wrote to memory of 2152 2128 965ba28048f83c5fd444603933420e9d22f46f9e20709c03850a9a5824659fda.exe 30 PID 2128 wrote to memory of 2152 2128 965ba28048f83c5fd444603933420e9d22f46f9e20709c03850a9a5824659fda.exe 30 PID 2128 wrote to memory of 2152 2128 965ba28048f83c5fd444603933420e9d22f46f9e20709c03850a9a5824659fda.exe 30 PID 2128 wrote to memory of 2884 2128 965ba28048f83c5fd444603933420e9d22f46f9e20709c03850a9a5824659fda.exe 31 PID 2128 wrote to memory of 2884 2128 965ba28048f83c5fd444603933420e9d22f46f9e20709c03850a9a5824659fda.exe 31 PID 2128 wrote to memory of 2884 2128 965ba28048f83c5fd444603933420e9d22f46f9e20709c03850a9a5824659fda.exe 31 PID 2128 wrote to memory of 2884 2128 965ba28048f83c5fd444603933420e9d22f46f9e20709c03850a9a5824659fda.exe 31 PID 2152 wrote to memory of 3000 2152 puxor.exe 33 PID 2152 wrote to memory of 3000 2152 puxor.exe 33 PID 2152 wrote to memory of 3000 2152 puxor.exe 33 PID 2152 wrote to memory of 3000 2152 puxor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\965ba28048f83c5fd444603933420e9d22f46f9e20709c03850a9a5824659fda.exe"C:\Users\Admin\AppData\Local\Temp\965ba28048f83c5fd444603933420e9d22f46f9e20709c03850a9a5824659fda.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\puxor.exe"C:\Users\Admin\AppData\Local\Temp\puxor.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\fivib.exe"C:\Users\Admin\AppData\Local\Temp\fivib.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD57e54542f6006fc0f7e9a20a367042d0b
SHA11876a468b71c69440b14b151cec2b236d5da990c
SHA256e0f9e746e86d81c2b292190ecf44fe2b9f877a9dbe4cbd5f50332059032a29f4
SHA5125a14eb1d1b7b3dda369faef1dc3995af591740cc98750e8368889e97d2afea13153eaacf87c9e02998fa5cac9711a0ae2c0964c56fd0683d0622702bfe423cb2
-
Filesize
512B
MD52da2b1fa4348105386817726cb3a2140
SHA1d1524396088686ffca98559a670648924896a574
SHA2563bc5f756e14f6d4748dd964df9eac86666b0ce4dd82b06518f9df563cf2dd091
SHA512d4d9b49d018dc88f613516e7c141e236e9f76e0a02fac129fd0b34a159709cdb5370e58cbf0fc55215ce1d8d02eb1a43736e69df571c6754903f70dc3826ef65
-
Filesize
172KB
MD5d124756e342c2f4842d02bb2959b062d
SHA1e29bf65a1b173466e431139b92cad0d8ea561cd4
SHA2565847417812ac40ee9c5084d3909f1906332164b527fbd5a18e71ed36d7bc436d
SHA51298f37a3502ab31e2c1f374ca40e4a08922105bf73357121046240d40a4580de39df957fbfafcaf3255782712213ad619a7320152eec5b35565eb09919ad0b497
-
Filesize
331KB
MD57a44b712cd0d5723b07eea301aab2399
SHA13ff58975eab41d5392d3e7b856487e1d9fc74f41
SHA256a1a13da677134d78df64c1b771d5763b4cc3c26ccd2c896ce5c01edf2e608ca8
SHA51243430765d044cac3a8f46052625f05d886ea1e262f680d32efc7facea967220c01d82ee8733b33f4730d5bd7411e95821421b93d60b6dff989afa560a13e9115