Analysis
-
max time kernel
169s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 08:24
Behavioral task
behavioral1
Sample
1355682569550edcb370e7a820c0448a.exe
Resource
win7-20231215-en
General
-
Target
1355682569550edcb370e7a820c0448a.exe
-
Size
556KB
-
MD5
1355682569550edcb370e7a820c0448a
-
SHA1
57010eac58e38033f1ce9b5757af6bcfc801f602
-
SHA256
6ca088dbaacae332620f3f87e1aae62862ac51413e1d5f642a2e1aa968b4de1f
-
SHA512
1df2a9f417a4445dc73bf90cbff349436b50763ec56f122678aeabda1283fd7c8b4f7a82970c092a81ef110d751ae7c13213519e00b6e3b88bfa5e3dc5f16072
-
SSDEEP
12288:zccNvdRExZGe+Q1nSoS++43x+l7QLiaEyD:znPfQp9L3olqFD
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 1355682569550edcb370e7a820c0448a.exe Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation joavf.exe -
Executes dropped EXE 2 IoCs
pid Process 4436 joavf.exe 3936 quhoz.exe -
resource yara_rule behavioral2/memory/1764-0-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/files/0x0009000000023135-6.dat upx behavioral2/memory/4436-12-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1764-14-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/4436-17-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/4436-28-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe 3936 quhoz.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1764 wrote to memory of 4436 1764 1355682569550edcb370e7a820c0448a.exe 90 PID 1764 wrote to memory of 4436 1764 1355682569550edcb370e7a820c0448a.exe 90 PID 1764 wrote to memory of 4436 1764 1355682569550edcb370e7a820c0448a.exe 90 PID 1764 wrote to memory of 4140 1764 1355682569550edcb370e7a820c0448a.exe 91 PID 1764 wrote to memory of 4140 1764 1355682569550edcb370e7a820c0448a.exe 91 PID 1764 wrote to memory of 4140 1764 1355682569550edcb370e7a820c0448a.exe 91 PID 4436 wrote to memory of 3936 4436 joavf.exe 104 PID 4436 wrote to memory of 3936 4436 joavf.exe 104 PID 4436 wrote to memory of 3936 4436 joavf.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\1355682569550edcb370e7a820c0448a.exe"C:\Users\Admin\AppData\Local\Temp\1355682569550edcb370e7a820c0448a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\joavf.exe"C:\Users\Admin\AppData\Local\Temp\joavf.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\quhoz.exe"C:\Users\Admin\AppData\Local\Temp\quhoz.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:4140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD5a1f2d63bf7e6171e5e3bb0341ecb8803
SHA1d45789e3b9398d1018337bda0c7d66865510b2e3
SHA256bda25b5a4eb75538ee425c7070e920e6f169aab05d07bec8e94051e45d475b53
SHA512ca76ee81b2bacb08baac7c12a7005225b279cd0a89ff5f2050cb9e12b05946d7552921df518714397c401e5b7a1d0525dc8ea4bc3014fad2df188132196989a0
-
Filesize
512B
MD581a95f8d013159312e045e489857f50b
SHA1b6219e168abc8ac96bd712754ad93ba1dc44b1d5
SHA256d22e0b6454d997fdda795292590fbcf08e4dd83fd54bfad29392fb19fa71384f
SHA512429c7c8740599e11ef486d73e90be2de545fccb7d98daaf91c464b5c8da271cb5b109a5a127c4b32f7756adff7d720a3dd897b68aa5bb2985a23a0dfb62f1c93
-
Filesize
556KB
MD5fb08481a3ab0d96dcad94d1903334380
SHA15b7fa2c3b519f5fbb236fce67a3a7770abad1bca
SHA25613d096d105f853056c7d8e87f00bd01c9caa8a7e81b41f4a772eb95a1c58d0d9
SHA51277e727e58426959e45c9509316a0b1a656a3fea9711326814ee04cca1c03a2bea26979d5ea49f10e9aff1a512eb7248cba548ed836b456721acf8a36d2b97342
-
Filesize
194KB
MD5b10728d0fb927edbb2cddac5557f61de
SHA10784a95397f940873bef0507e48e0df6bd14b880
SHA25666c2231aa39d31b35ef5a9dcc440a2bff671a0889f20dd696d710bbac8051fcb
SHA512b660f2224efe6c74897c098b3e81348887fb26ba058969b99129fd0c41b4df964275c7a7051567c94441134fa124e3c86026d3525a461f8d4812010b6e32e008
-
Filesize
188KB
MD5cafd8405d3c9930ff22817084373f6f3
SHA1358016a87c8a4aa3d0d7d19430d085f2bf58e162
SHA256890d9b17649f30360fa5107a2d5a3f45c2dedaac1953a1fc68b305ab52f218ac
SHA5124e2559bbf6e700fd3c39f2f68b60ae50ac7205f1cf76686a02fd90be5c40718b84bd9a11a7b3697dec404200867dfebd7f6bae02d83ae4a090aeb8b44945eea4