Analysis
-
max time kernel
149s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 17:34
Behavioral task
behavioral1
Sample
a9c0800d6f48953b981576b464623ad7.exe
Resource
win7-20240221-en
General
-
Target
a9c0800d6f48953b981576b464623ad7.exe
-
Size
441KB
-
MD5
a9c0800d6f48953b981576b464623ad7
-
SHA1
aa0e2fd82c0c55f6d01d06863ca8aaf88255db68
-
SHA256
81f5fc7247797d5d8dfb5860cd12535ac879ec2507ac934cdf2d05e76c2d59f7
-
SHA512
229b4abfce3c63fc65c648c2496dbbd28a5388e4b7da05d377f4f030f6b1ee9bedf257dcb8c291ebf2ff87acd2ebc2e74d1e169e0d98827c1702c805bd4e64bd
-
SSDEEP
6144:oo3wBi+1Py3V0a2WkRNgi3caOHO5NjEwwiYWB5mV4Pzw9ygibGGMb:rKf1PyKa2H3hOHOHz9JQ6zBQ
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation nuvuf.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation a9c0800d6f48953b981576b464623ad7.exe -
Executes dropped EXE 2 IoCs
pid Process 1992 nuvuf.exe 3272 osibl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe 3272 osibl.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4116 wrote to memory of 1992 4116 a9c0800d6f48953b981576b464623ad7.exe 89 PID 4116 wrote to memory of 1992 4116 a9c0800d6f48953b981576b464623ad7.exe 89 PID 4116 wrote to memory of 1992 4116 a9c0800d6f48953b981576b464623ad7.exe 89 PID 4116 wrote to memory of 1324 4116 a9c0800d6f48953b981576b464623ad7.exe 90 PID 4116 wrote to memory of 1324 4116 a9c0800d6f48953b981576b464623ad7.exe 90 PID 4116 wrote to memory of 1324 4116 a9c0800d6f48953b981576b464623ad7.exe 90 PID 1992 wrote to memory of 3272 1992 nuvuf.exe 97 PID 1992 wrote to memory of 3272 1992 nuvuf.exe 97 PID 1992 wrote to memory of 3272 1992 nuvuf.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9c0800d6f48953b981576b464623ad7.exe"C:\Users\Admin\AppData\Local\Temp\a9c0800d6f48953b981576b464623ad7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\nuvuf.exe"C:\Users\Admin\AppData\Local\Temp\nuvuf.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\osibl.exe"C:\Users\Admin\AppData\Local\Temp\osibl.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3272
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:1324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD56cb826f6f751321b98ee56ea49757118
SHA1253f34fe009ed7baf89c166eecdfd4e427b602d7
SHA25629783840ec3c668e3ecc60d93fb245c38a6ce76c04065ce8a0749e676e4beab7
SHA51269f09f31aa3ea34d39fd673d9ecc4c5e31089cc1d55ba4da80d67e1d99b45a9fb1cbcab0a03cda6b280a61e764fbfa8c28e82627d36945ea2c3633c606bd7699
-
Filesize
512B
MD5fb9ce377f9b1fb9f45e68f5ff25046c0
SHA118f7663a82ccd6983d4033421c836017190e5303
SHA25622aaf8bedca367a0d2521f1997546d8c5dc9abf15870afdcfbd9382ffc94df3d
SHA512305fbaec646bd6d662d53781f790041ebe2fedf896dcbab8427ceedb1fb020cd08566e47fb8f7fe886df057afdf2a434dcabf04a244bee6bb9caee952c7386be
-
Filesize
441KB
MD504799bc023c6343f935ba535d87c4a50
SHA14ffd6076e1432383349c16e67fa35f80887a3356
SHA2560c81286107e1357ac4a35cecd2006cdec7b7a04aa9bea9bac567a395f44d3d0e
SHA512b6b39adedb2094b05e3e6dd7c0f4c7d65da092b345af247e77d2e8e7f0fd1a4f3d1a3e893e59dd1985566ca0d779b3c074c62cde82b7775e699b52bad7303e6c
-
Filesize
230KB
MD5aa2f9018903d292708586e89b8dad335
SHA12cfecb1e246fd6599313d245e8c294d2af06aa58
SHA2567d9d9ca2ec3bb1891eaaa0d00c7aaf18deb5d6224003b013a5f70447d8ddc856
SHA51284032d9540cc30c0d014b5dac660141ff047fe9344e823bdfd1abbf01cd95a99d22aae922ae514ab75b86421d8946e71831267a168440b037a42f9e5076ff5b3