Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 14:34
Behavioral task
behavioral1
Sample
39fc2f065fcd40fe8eaa9c2111a05f87.exe
Resource
win7-20231215-en
General
-
Target
39fc2f065fcd40fe8eaa9c2111a05f87.exe
-
Size
465KB
-
MD5
39fc2f065fcd40fe8eaa9c2111a05f87
-
SHA1
628101daca9506b2f5863b2962671c462158b82b
-
SHA256
be4b9fca1e031f9d8314c94515bba09a45c11894738c9cdd223e17d3a91c3dd8
-
SHA512
9cf10ed0ee1be9deffea5667543baef95e60788a2463e3859c6ad07eb530cab782423d674f2aed272f83d8fe9afb9d74df8254dfe43c846e70ae14158cd6c309
-
SSDEEP
12288:m6twjLHj/8/GcHUIdPPzEmvTnabAh0ZnAr1UFW:m6tQCG0UUPzEkTn4AC1+P
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 39fc2f065fcd40fe8eaa9c2111a05f87.exe -
Executes dropped EXE 1 IoCs
pid Process 3548 edmau.exe -
resource yara_rule behavioral2/memory/1184-25-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/1184-28-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/1184-29-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/1184-30-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/1184-31-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/1184-32-0x0000000000400000-0x000000000049F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4284 wrote to memory of 3548 4284 39fc2f065fcd40fe8eaa9c2111a05f87.exe 71 PID 4284 wrote to memory of 3548 4284 39fc2f065fcd40fe8eaa9c2111a05f87.exe 71 PID 4284 wrote to memory of 3548 4284 39fc2f065fcd40fe8eaa9c2111a05f87.exe 71 PID 4284 wrote to memory of 1184 4284 39fc2f065fcd40fe8eaa9c2111a05f87.exe 70 PID 4284 wrote to memory of 1184 4284 39fc2f065fcd40fe8eaa9c2111a05f87.exe 70 PID 4284 wrote to memory of 1184 4284 39fc2f065fcd40fe8eaa9c2111a05f87.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\39fc2f065fcd40fe8eaa9c2111a05f87.exe"C:\Users\Admin\AppData\Local\Temp\39fc2f065fcd40fe8eaa9c2111a05f87.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuy.bat" "2⤵PID:1184
-
-
C:\Users\Admin\AppData\Local\Temp\edmau.exe"C:\Users\Admin\AppData\Local\Temp\edmau.exe"2⤵
- Executes dropped EXE
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\ricyi.exe"C:\Users\Admin\AppData\Local\Temp\ricyi.exe"3⤵PID:1184
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD5ec9fdd3590830abfb8ef1d43032bfae5
SHA184feece69ba3ac2fb22c4d4b1c79c952936eaae9
SHA256c86d16e277694e3240419b4299a5da759543f09b6dd5f24940b31d2ada557797
SHA51282c6f6f1094d57b8a5739615fc93740e8f86b02c7f84df8e4bade1096047f2b4ca22f5ffae3581ed6e870ffaad151077e3a30c4d51dc95ece47855cfedc6282e
-
Filesize
342KB
MD58b3b4aa1324f1d6261ef56d1e60c5c2a
SHA135ca5a243b6bccd6aacb6a89131a4df661403f1e
SHA2562a1a14613e202579204ddb237bd5a3c7581eaa64c6d1a45209ce967e68388eab
SHA51224530e85facc2b2099521abfbbf2a991b476521274fc352b6e15a83ba6ad239f5a5ab95c8530c782ee08d0dd0742bf35a350c8a0c004d2e081a06521879a89f8
-
Filesize
512B
MD536b11dbad39262aec7b65ab1c5d684da
SHA1d14a1c4c5a71cbb1c03f9ec189d8946db3c8cbd5
SHA25698ee4717bc967bb0980e109b2337c7459f98b7680604a36e7a4de557ef611d79
SHA512df67eab4f5d07feccfcda0bce1ff61fab3dc746af9a9d3df7d52e87408fe37d0e377a3d75fe9ae72ee34f1b2e07f7701813f17abb4d7df63e2c48ec72dccd402