Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791.exe
Resource
win7-20240221-en
General
-
Target
e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791.exe
-
Size
344KB
-
MD5
e90fbfc35090355aec173d79341b7b8c
-
SHA1
6de2e18af5013c1236f691d03fe739471126a42e
-
SHA256
e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791
-
SHA512
c9fdc21fc07ea8272cfa9555316d91df9fab5d226f5c696b78d4cb4461df8ab4b35a01da0d3ca46ce229e945bb33ae23f1c7fb39c4ba1764af50d70915623610
-
SSDEEP
6144:DX+psoWJ+IvLI7BziS3qoJGd2GexPZmxMcVp0XpY:ymoWkI094og2GgPZkiC
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791.exe -
Executes dropped EXE 1 IoCs
pid Process 1236 vehol.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4392 wrote to memory of 1236 4392 e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791.exe 92 PID 4392 wrote to memory of 1236 4392 e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791.exe 92 PID 4392 wrote to memory of 1236 4392 e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791.exe 92 PID 4392 wrote to memory of 1852 4392 e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791.exe 93 PID 4392 wrote to memory of 1852 4392 e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791.exe 93 PID 4392 wrote to memory of 1852 4392 e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791.exe"C:\Users\Admin\AppData\Local\Temp\e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\vehol.exe"C:\Users\Admin\AppData\Local\Temp\vehol.exe"2⤵
- Executes dropped EXE
PID:1236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:1852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5bb58049e335fa69e3e5ad91fdb5170bd
SHA1580f55735f98c128eb0eb95968e00b92a4f6267b
SHA256882ad1d47647dbd566bc502b07b00ede2382b9494c1616164b8ab67e7620af7b
SHA51280ba5f3064b717868d72be7388f8d7779351123894168b3af9a4baa65a9909eecb68c732a9b4d0a09f68498e600c1cbae01603de189a64f97072f2ca70ac3a2a
-
Filesize
512B
MD580130d89b4673329154dfd41724d65bd
SHA1151c947a6275da29ce8d37a9bb12e52c25f39822
SHA2564fe24076b28e2da31189b7603ed28feab78dde66ffa64ee63a5df248f0866de9
SHA5129814069192e8510b70618cbf9ced7f15a76f6f97cf3e9474e316715db749c497878298a9ae5800b5fe215e79cebc62c62ede2be4b10e20aa719026f2fc2ab3b3
-
Filesize
344KB
MD5b13ac26d39be6878376856c0176e793e
SHA194e655046cd886c35688d1596d968a367f5dc842
SHA256aeff41d8c1c4a050974c11f9353f388d5c0f0035d7f2927ece399c4223d50ec8
SHA512e19c25624d075aa799aa90f069f2831dd8f015defa318b649e9f72437d8932b096377321df219bfbb89d48fea8431ac01dbc1bd3ebf5fb55fd4467d5e72a2c2e