Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 19:10
Behavioral task
behavioral1
Sample
44fc4fba4ac5f5a9d36cd543aa733d076a38c2e7a1d71834389468166ab48b52.exe
Resource
win7-20240221-en
General
-
Target
44fc4fba4ac5f5a9d36cd543aa733d076a38c2e7a1d71834389468166ab48b52.exe
-
Size
167KB
-
MD5
d26676d7f2326eff6d1e61e37e4a2f51
-
SHA1
a5912c9d44e31e96c80bca866c26eeca6f3e8b3f
-
SHA256
44fc4fba4ac5f5a9d36cd543aa733d076a38c2e7a1d71834389468166ab48b52
-
SHA512
cf79c68be4b11249c452a868d69f1da0ee91a02c0a0122236f1156b3602d39e5379dd0a1fa83729ac855251c0a18516df0b195e2ee9333c62603b4466e3ff21a
-
SSDEEP
3072:yp56zRJ83+OJ7NoGvdwWy6k04yW/KR0Yx4BXP6:yOzRWu27dlOd5/YWVy
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 44fc4fba4ac5f5a9d36cd543aa733d076a38c2e7a1d71834389468166ab48b52.exe -
Executes dropped EXE 1 IoCs
pid Process 368 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4640 wrote to memory of 368 4640 44fc4fba4ac5f5a9d36cd543aa733d076a38c2e7a1d71834389468166ab48b52.exe 92 PID 4640 wrote to memory of 368 4640 44fc4fba4ac5f5a9d36cd543aa733d076a38c2e7a1d71834389468166ab48b52.exe 92 PID 4640 wrote to memory of 368 4640 44fc4fba4ac5f5a9d36cd543aa733d076a38c2e7a1d71834389468166ab48b52.exe 92 PID 4640 wrote to memory of 4900 4640 44fc4fba4ac5f5a9d36cd543aa733d076a38c2e7a1d71834389468166ab48b52.exe 93 PID 4640 wrote to memory of 4900 4640 44fc4fba4ac5f5a9d36cd543aa733d076a38c2e7a1d71834389468166ab48b52.exe 93 PID 4640 wrote to memory of 4900 4640 44fc4fba4ac5f5a9d36cd543aa733d076a38c2e7a1d71834389468166ab48b52.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\44fc4fba4ac5f5a9d36cd543aa733d076a38c2e7a1d71834389468166ab48b52.exe"C:\Users\Admin\AppData\Local\Temp\44fc4fba4ac5f5a9d36cd543aa733d076a38c2e7a1d71834389468166ab48b52.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:4900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5d7ce8d6716c0e4e18747cdc77378b9dd
SHA1bd51fe38725bd218532fa7ba9d442ac992a14ba5
SHA2561744777ea2c7561254594b4232e8fc1ca57e7fe10a5869921259963198c5f4ab
SHA5123967f4d2a947e26024f6d7ce4723670d22abfb538c7fd7520c17418238ba25dbedae74507bb59cded5460006b2e3fcfdeebaee95c31ee63d11727664a196feee
-
Filesize
512B
MD5ac5e84ed8031d66a9fcd5e472ba8091b
SHA106303add604104d6abbb69458f89773c066b470c
SHA2563a3cfa6f4786dab0ac8bc76204948f32a3a2cbd094922f87c251ec80d22baae5
SHA5127bf829102a70a1304dae435b8ae3c9ef9a925af7e995fe381d80730f4f702e1fd2a0a1b6a3a4b4667925f5bb95c897166a8fc0f52d3171d9cdba0bf09b53f152
-
Filesize
338B
MD521a39d646f82ab8578b99ed066620582
SHA16b98ac6aada039eff69f111dff94e3a582aeeea0
SHA2568f2e41d48e83f279af8463f7bc23c0a9f8c09ef7ba1920f266fb2c9a96839552
SHA512876d442548759532e01a3bfdbbaecfda38685f024c61421712bbd9831dec6e6ab132df0deafb3d16b444255a4ff841b678453be28e1b714250f1ec619367c331