Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe
Resource
win7-20231129-en
General
-
Target
8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe
-
Size
343KB
-
MD5
39d3b86f9e8cf53ae91e37b591271ea2
-
SHA1
163cfe040644500164b2ef914cef0d00ef1225e9
-
SHA256
8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21
-
SHA512
cdc41c741fe321571c06bff183db762f5b74ee06b6a00afeb1335d900c4a5fb8f052930a4c77500fe5328b912dfccd0f3a8a1fecdfd2b34862b98e1f90189f2f
-
SSDEEP
6144:SF/gEKyOAuuHcqXt96bHa+bZu0k6XCCbd2CKcwA2x9G+84AmGSncH:SF/gVyduuHv946gZ6bCbd2qspnA6g
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Detects executables built or packed with MPress PE compressor 8 IoCs
resource yara_rule behavioral2/memory/2556-0-0x0000000000400000-0x000000000048B000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2556-1-0x0000000000400000-0x000000000048B000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x00080000000231fc-7.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/1172-15-0x0000000000400000-0x000000000048B000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1172-13-0x0000000000400000-0x000000000048B000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2556-16-0x0000000000400000-0x000000000048B000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1172-19-0x0000000000400000-0x000000000048B000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1172-32-0x0000000000400000-0x000000000048B000-memory.dmp INDICATOR_EXE_Packed_MPress -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation yjulq.exe -
Executes dropped EXE 2 IoCs
pid Process 1172 yjulq.exe 792 wegeg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe 792 wegeg.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2556 wrote to memory of 1172 2556 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe 92 PID 2556 wrote to memory of 1172 2556 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe 92 PID 2556 wrote to memory of 1172 2556 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe 92 PID 2556 wrote to memory of 1544 2556 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe 93 PID 2556 wrote to memory of 1544 2556 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe 93 PID 2556 wrote to memory of 1544 2556 8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe 93 PID 1172 wrote to memory of 792 1172 yjulq.exe 106 PID 1172 wrote to memory of 792 1172 yjulq.exe 106 PID 1172 wrote to memory of 792 1172 yjulq.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe"C:\Users\Admin\AppData\Local\Temp\8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\yjulq.exe"C:\Users\Admin\AppData\Local\Temp\yjulq.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\wegeg.exe"C:\Users\Admin\AppData\Local\Temp\wegeg.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:1544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5b0f9901cc65a6f7a0157f6e9ab2c56d4
SHA1cb282e364211b9cd63bcff73a567863780e1833f
SHA256b94d08c89c87f6e4fb50258c652cc9bea4d95e2cdb671cefcc0be28c00d924b5
SHA5127b1fe66e76c67bc686e583d42b6a5cb8282d5ccc3f35a3668e34f4d7b7375a76e565ed2a855dc109371a0af3f38cb8176c0aee4bff302dc8bc2b61c00d616326
-
Filesize
512B
MD50f99e3548fb9557c6bb64a38956c807a
SHA1f16f7f2be70391aed9c13294cedcdeaf3cfeb6d1
SHA2565c6b8e0ac403dd93898c011d576279d034c0c6dbd9db8705774e905cc12fce03
SHA51201746f7ed3334de57b30d8158652b8d4f0564b7f00469515de61bacf6151389c3f1fb0f07ec6281a0f66ebe61c8bc4078b2fa27ed4e994deb3b4c4f05e186a00
-
Filesize
218KB
MD5a7b5d8a06d41594be6048f25c450a048
SHA132752863b4f17bfe4f9d8b131c7d924e79aaaf89
SHA256e4dae589c3de5a94da99e1e4f668a444be0a79af290655eab16b49a902d563c5
SHA51260c2af813412254949862bcc2cbd4ff46ea3ce50355e28cfde6d3a784a4bf4e134f3ee70b0c0b0fb5c48892805dd7f088e09a00d4284e27874a54fa6209246e8
-
Filesize
343KB
MD594ea5133606b1b9ba438bbfdaa54cfbc
SHA13e0443bf28b0895706744a10fb67f44464706621
SHA256d31fc642f6bc82cc9359b724213b546b03b69f48c3d40157f726e0886d549aa3
SHA5125da25d18113ca5c448ceebaccca9e57e294a207a1c6600f900ba276bb79fe5ebea2a15d15a9901fdbefbb27b7e90c786cfa3dadf333c569d92c66b9b137a56d6