Analysis
-
max time kernel
141s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
ba13f33cfc5b100a74c247810382860f.exe
Resource
win7-20240220-en
General
-
Target
ba13f33cfc5b100a74c247810382860f.exe
-
Size
49KB
-
MD5
ba13f33cfc5b100a74c247810382860f
-
SHA1
7727774b9cc59f36eac88f05747bd929bfefa806
-
SHA256
3c76b9859afeb266484593f3cfd4b7e6af989e655313c0080a523ec5c85bcdb2
-
SHA512
4ae5b60c47d8ccec120290cf8b589ca5be485166c482c5c57c4606b0028f22587503cc251fe29ba300dfabc2978add745f26e2f8da1e4a8fc1314f970d125f1d
-
SSDEEP
1536:834/PC7Ruz3hRXRASULZ6JKYdbzcmhCZn:It7R8fU6n8
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ba13f33cfc5b100a74c247810382860f.exe -
Executes dropped EXE 1 IoCs
pid Process 2440 mokdhft.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2440 2804 ba13f33cfc5b100a74c247810382860f.exe 97 PID 2804 wrote to memory of 2440 2804 ba13f33cfc5b100a74c247810382860f.exe 97 PID 2804 wrote to memory of 2440 2804 ba13f33cfc5b100a74c247810382860f.exe 97 PID 2804 wrote to memory of 4152 2804 ba13f33cfc5b100a74c247810382860f.exe 98 PID 2804 wrote to memory of 4152 2804 ba13f33cfc5b100a74c247810382860f.exe 98 PID 2804 wrote to memory of 4152 2804 ba13f33cfc5b100a74c247810382860f.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba13f33cfc5b100a74c247810382860f.exe"C:\Users\Admin\AppData\Local\Temp\ba13f33cfc5b100a74c247810382860f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\mokdhft.exe"C:\Users\Admin\AppData\Local\Temp\mokdhft.exe"2⤵
- Executes dropped EXE
PID:2440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:81⤵PID:1368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD539e55c2b5135dd669ad371cc03d79fc2
SHA1d027fea84a269f8e556dfb5411ac3d01b9311017
SHA256ecf7b9f0150af34b1d09f4602f0acf31445ff28e40b2411b0e32180bb8672919
SHA512e75942d900b97d254097d8a44bfde16bdc99cc0f124541316a0987b2fb5433b7b1f12d4eff8b47d05e9068e7a038e4dd92998646448dcb0d6615a81a561ef280
-
Filesize
49KB
MD559d7e5e8eb6710bfad818a2c4259f776
SHA1bbd1debc8e2e384b4689ac11fea170fd7b49d117
SHA2566dd6f00f5680794e6ef15b379469969519befe58b39770060213c7166ac469e2
SHA512b01868153ace756813f707860186c74d795da8f918f6b50189b1dd3408bc94e6fb3447810e9e5d063b8758ec54831116d045a8c4597091fd451c42ec5959a73e
-
Filesize
274B
MD5013c1ea119ff83a4c38a9cbd16796d9d
SHA17072aa23a0f0a8e67ea056e82d49ce86a6d5135d
SHA256f60232dd8af93b0214ad25da561d5cd5650e077dfb2457c68b0fcc220cc87e63
SHA51229a31b79a4da37a9c5f2077e58317264919f767d8877c521a7f7c4199ea11bf10b5f9aa623b0e1ca03f41ba47312c80d7e345b7e0bc8e868e4cbde9c7049a82e