Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
0dd98e2be17fc66f811c5f0ca7655d71_JC.exe
Resource
win7-20230831-en
General
-
Target
0dd98e2be17fc66f811c5f0ca7655d71_JC.exe
-
Size
56KB
-
MD5
0dd98e2be17fc66f811c5f0ca7655d71
-
SHA1
a2dfd1dbaed6ab8336882c18999c01f43569872e
-
SHA256
3d7fc49e3aa443f4a2b76f42b5fbb2a440043026559ba753f5f7b25fb80c1c21
-
SHA512
91bb32d9753c078efa352228f71641ca566458ba801b0df0cccb7723a73ee4894874d6117dee17c589e8ab64196699622abb74b2012f9a50ba379dcd6c0c18ac
-
SSDEEP
1536:ZjMcyJNDLl7bSHliJQmpoDX+wtS1syxMD3G9:ZjwfvQlEhpoT3YVWDW9
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.207
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation 0dd98e2be17fc66f811c5f0ca7655d71_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 4680 dofhir.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3844 wrote to memory of 4680 3844 0dd98e2be17fc66f811c5f0ca7655d71_JC.exe 85 PID 3844 wrote to memory of 4680 3844 0dd98e2be17fc66f811c5f0ca7655d71_JC.exe 85 PID 3844 wrote to memory of 4680 3844 0dd98e2be17fc66f811c5f0ca7655d71_JC.exe 85 PID 3844 wrote to memory of 1772 3844 0dd98e2be17fc66f811c5f0ca7655d71_JC.exe 87 PID 3844 wrote to memory of 1772 3844 0dd98e2be17fc66f811c5f0ca7655d71_JC.exe 87 PID 3844 wrote to memory of 1772 3844 0dd98e2be17fc66f811c5f0ca7655d71_JC.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dd98e2be17fc66f811c5f0ca7655d71_JC.exe"C:\Users\Admin\AppData\Local\Temp\0dd98e2be17fc66f811c5f0ca7655d71_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\dofhir.exe"C:\Users\Admin\AppData\Local\Temp\dofhir.exe"2⤵
- Executes dropped EXE
PID:4680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5d6995461926b480b61a5ff81674913fe
SHA18bac912d93cf84ff8986133b72a4ab048a2fabc5
SHA256c74aec2edc17c953ff0cd0db571568779e8e08ba8e2de1dcc60e8343acaaf7d2
SHA5124ab427dfbd913b8137d56418fc13e423033d13faf98c1c50838159f0c1103e44dea409b84b1e20191dd3ad67bb8a63cdb692427480aa48c1fbb2ed05f30ae857
-
Filesize
56KB
MD5d6995461926b480b61a5ff81674913fe
SHA18bac912d93cf84ff8986133b72a4ab048a2fabc5
SHA256c74aec2edc17c953ff0cd0db571568779e8e08ba8e2de1dcc60e8343acaaf7d2
SHA5124ab427dfbd913b8137d56418fc13e423033d13faf98c1c50838159f0c1103e44dea409b84b1e20191dd3ad67bb8a63cdb692427480aa48c1fbb2ed05f30ae857
-
Filesize
56KB
MD5d6995461926b480b61a5ff81674913fe
SHA18bac912d93cf84ff8986133b72a4ab048a2fabc5
SHA256c74aec2edc17c953ff0cd0db571568779e8e08ba8e2de1dcc60e8343acaaf7d2
SHA5124ab427dfbd913b8137d56418fc13e423033d13faf98c1c50838159f0c1103e44dea409b84b1e20191dd3ad67bb8a63cdb692427480aa48c1fbb2ed05f30ae857
-
Filesize
512B
MD51bda36d555a6a668c71a805d0fef7b43
SHA163ef5ec40ea61e0803c5f988c5f5b1fe5834eeab
SHA25691fc9a1836c535aa1bfa3288c635d24a44b76f9837702d0540fa8c1b97551a4c
SHA5125b01bfe55ff24db66250d5555b29fae4c24d988827b47301fc319dafcabd33ab2944789395c35a002919ebcf042da989d8cfa95349c3f7344d58b20b31b23ed4
-
Filesize
280B
MD5f2d9d63a1e9dddf91ed985c91bf48751
SHA1fc648371bf3a053db307995137d182c79522d43b
SHA256424c3c1f9f7a33ffe2b7b6760e3d1d7804b0f699c1e0df871153e373b217db72
SHA51241573a3a42c168a47437ab3152afce5cf88625605ea24b36f1f40575d396192d0830d24284ca35614348dbe931f9db85b0fc5730ae0653ec9218438f842b422b