Analysis
-
max time kernel
93s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe
Resource
win7-20240215-en
General
-
Target
88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe
-
Size
348KB
-
MD5
4c4b66c6b066b8edb66c349622eafa64
-
SHA1
a52526caa56039bd166e3b411d1e2cd91468a467
-
SHA256
88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91
-
SHA512
b2303535b7207ec167c8d3ebda7d010ac0346e73bfbf042cf916e3d07249e84bca4f5d1fc1cd056446ddbf601144cc000654712bbb837ec8f3eb130b73ff6d0f
-
SSDEEP
6144:SaVKyyzwbnUkoiqwcAR92+TdO5CksxCDy9pPbzBHU2ytluF5:g7yUTihR3ONs46pP3BHUbtg
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe -
Executes dropped EXE 1 IoCs
pid Process 4768 lyitb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 6124 wrote to memory of 4768 6124 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe 89 PID 6124 wrote to memory of 4768 6124 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe 89 PID 6124 wrote to memory of 4768 6124 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe 89 PID 6124 wrote to memory of 2172 6124 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe 90 PID 6124 wrote to memory of 2172 6124 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe 90 PID 6124 wrote to memory of 2172 6124 88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe"C:\Users\Admin\AppData\Local\Temp\88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:6124 -
C:\Users\Admin\AppData\Local\Temp\lyitb.exe"C:\Users\Admin\AppData\Local\Temp\lyitb.exe"2⤵
- Executes dropped EXE
PID:4768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5113cdc98c8047fda62939eb3ad47f51c
SHA170751cc92e0601db54ed1a9aacb61afc3610d5f4
SHA2562f96c0204a00a5f08f08fa25b35670633fb3a8a56f0ff58ee036de5c20678902
SHA512989ae6cefb3b50b06ef8c6e004e1da56cacc637f0d2e2ca24bba9605d61659c1977a89dd26a115709155a5645dbfb28e05d2a3f21fde817a15bbf86876d24dde
-
Filesize
512B
MD56a56cb61dd7c9b3cd432a57e1bf2777a
SHA10237470a40007332703425f5b964520f2cfd2994
SHA256718b67ed2b4b2568eb9049beb8db42a8695ad29c72b721cf25bdbb6bd755168d
SHA512f5a795dd77dd1b5e74b850903b642aa0990f0b7474563d5e1d46561a58c3326a616e2cb1759a63bfff3da82e79c0dd8f2806e000075c014ce9ec646eef959ab5
-
Filesize
348KB
MD5845bd798ac3b8c726dd60470714eba29
SHA1bbdc3d0c4f3bbc8740caa8c8239610b00771cebe
SHA256d4800dd40ed47dd59f3471c706b60051b6e9bcfd521842fc65ae1ede1a835f49
SHA51219a29b9eda82b18c357426d7b3bcb8918f4d1e697fdbf5b5b52489f4eb3241b0324d74784984abba7e0fa4e6d2a3988f8cc54433eb826ded210b7f52ccb09978