Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 11:03
Behavioral task
behavioral1
Sample
0f85f187cb51b4b58c900a4d3a7f4326.exe
Resource
win7-20231215-en
General
-
Target
0f85f187cb51b4b58c900a4d3a7f4326.exe
-
Size
404KB
-
MD5
0f85f187cb51b4b58c900a4d3a7f4326
-
SHA1
41bea34a956d3442e5b68a9f06089a6d518d948b
-
SHA256
4f17482d94907eac89accce9f0f6651c9229c9ef0572e1c22286dc93575458d4
-
SHA512
13ddcc2ded8bdad36af3869386a381642dbac85ad06d34d0fae46ca92fd32b5da41fd6c4094bd46557216f6fbb65f9ce48af6f227685b7354a8e346b2f978196
-
SSDEEP
6144:GzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInODgM:oU7M5ijWh0XOW4sEfeO8M
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
resource yara_rule behavioral2/files/0x000300000001e734-21.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 0f85f187cb51b4b58c900a4d3a7f4326.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation cyquh.exe -
Executes dropped EXE 2 IoCs
pid Process 5408 cyquh.exe 4076 kitai.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe 4076 kitai.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5620 wrote to memory of 5408 5620 0f85f187cb51b4b58c900a4d3a7f4326.exe 93 PID 5620 wrote to memory of 5408 5620 0f85f187cb51b4b58c900a4d3a7f4326.exe 93 PID 5620 wrote to memory of 5408 5620 0f85f187cb51b4b58c900a4d3a7f4326.exe 93 PID 5620 wrote to memory of 5428 5620 0f85f187cb51b4b58c900a4d3a7f4326.exe 92 PID 5620 wrote to memory of 5428 5620 0f85f187cb51b4b58c900a4d3a7f4326.exe 92 PID 5620 wrote to memory of 5428 5620 0f85f187cb51b4b58c900a4d3a7f4326.exe 92 PID 5408 wrote to memory of 4076 5408 cyquh.exe 100 PID 5408 wrote to memory of 4076 5408 cyquh.exe 100 PID 5408 wrote to memory of 4076 5408 cyquh.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f85f187cb51b4b58c900a4d3a7f4326.exe"C:\Users\Admin\AppData\Local\Temp\0f85f187cb51b4b58c900a4d3a7f4326.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:5428
-
-
C:\Users\Admin\AppData\Local\Temp\cyquh.exe"C:\Users\Admin\AppData\Local\Temp\cyquh.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5408 -
C:\Users\Admin\AppData\Local\Temp\kitai.exe"C:\Users\Admin\AppData\Local\Temp\kitai.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD53efa6da303a715f29745b5c3ad8899a4
SHA1b8e86fed81b62480e2b1597983f1741fd748044c
SHA256a7dff11314fc79d62aa3bd886680b3bdf95c66190019a650c9735c38360c7aac
SHA512b3449237fa7023a320e72bf4acd7e99a10cd1502ae782476eb6f4aa83abf74d83b35c11802fbed5302bfce65ffba27ee9656a7a52bf2264b28b699f4c9641aa6
-
Filesize
404KB
MD5cb4f8840124a80e64c845959148d0beb
SHA190d974a9b6562c71e11a35bf22319839f5b7725c
SHA2566093aa04814a758512679479b72d000362227924d97487fbf7d35ad070b11e64
SHA512e6bb6fd5124e86f7d174d98fa24d7ccd7ff95cdcb1d130cf831dea82834b38dc38cf5accf740579d5a00c7f2c31c495799be15f48da74f466f1527ddf4d47cd1
-
Filesize
512B
MD5ce340c970809c20a71fe3697f0feb24b
SHA14cc723fd454d9c36ed654fe90754a03ac526d60b
SHA2563bfb50ed77c4b6eef42de59d8577c2eb7c85a3ca54c58cffa908c054eeccaffe
SHA512157a061ad80cce4a171c32f865d97f6a9ffd974326b078c0a09e0a613ebb76b4ce09b35d168c43d643cde03799a7a2e1927c2a2109011eed1419d855a9e82c37
-
Filesize
212KB
MD5d6d15ffe3f1045c14d7d5c599de042ef
SHA15beda7031c4f82bd220eed9cf08bc259284020a0
SHA25612d8bc187789e52307e98014c8f4212be04a37e1eb93c005fa349e1df61a89f7
SHA512bb10197f69cf86ed6b2d08b6645c88164fa71901ed3c445e99b0a9018bd79037913003e1c876cdafba545f605d8f18e419772b28644f99dbfbf5c042a5cef328