Analysis
-
max time kernel
100s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 22:22
Behavioral task
behavioral1
Sample
4338d227b68d80fc282073c758d0bac1.exe
Resource
win7-20240319-en
General
-
Target
4338d227b68d80fc282073c758d0bac1.exe
-
Size
366KB
-
MD5
4338d227b68d80fc282073c758d0bac1
-
SHA1
7fb57bdfcfd56035b34adf47bdd6e1cd205613ce
-
SHA256
41a06a41931fe281179944dbc9ec941d88eac9063d8877664c4e584569e4cb66
-
SHA512
0942b5dfe9f4b4e20607f772d885965590d76432a35343702418a3c91cc3f1abd76bfcdbcd09939f8ea43786464bf3453474cb97da0c342e5654d5c1c45e90ab
-
SSDEEP
6144:OuJkl8DV12C28tLN2/FkCO0aHftvCGCBhDOHjTPmXHk62pk:OzGL2C2aZ2/F1XaveOHjTo
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 4338d227b68d80fc282073c758d0bac1.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation synup.exe -
Executes dropped EXE 1 IoCs
pid Process 1508 synup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1572 wrote to memory of 1508 1572 4338d227b68d80fc282073c758d0bac1.exe 85 PID 1572 wrote to memory of 1508 1572 4338d227b68d80fc282073c758d0bac1.exe 85 PID 1572 wrote to memory of 1508 1572 4338d227b68d80fc282073c758d0bac1.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\4338d227b68d80fc282073c758d0bac1.exe"C:\Users\Admin\AppData\Local\Temp\4338d227b68d80fc282073c758d0bac1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\synup.exe"C:\Users\Admin\AppData\Local\Temp\synup.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56B
MD5894354f904433a6add57dc27f1526fb7
SHA19d4b7d610c483832e03f80c72854ebd7ed1a114e
SHA256e477c75c9fdc084c5568141664be7392264ed3b4412a6b8a27e8f1fd7943b81c
SHA51226ebe839e3ca8f653caf1e622e0941482fe5571fdaf5d094adb0d03e42936a87658c43e18150a642fa5d747b96f0f41439c7bda49ede98266989702029c8ea7e
-
Filesize
512B
MD5efe9a3b5a9fa85629fe3e4bfddc60d80
SHA1f220efdc9f9af8573b37580293f0a6ace6182165
SHA2568c9e42afad95140e9736d71cfff6e682e53635becc48bb90e34225fc8126dad6
SHA5122c0a4fb0c939fb5d4e928667abf3c6704e03f1118e10fe1143dd8863ce482b524af71bd77941547189b41d77be40bca500690947a271f8428e753536c07aa33c
-
Filesize
366KB
MD581a5e170f3a6a40693813098220e0bc0
SHA1fa4741656747fdf2199dd2c414d4f65ecfbcb5f4
SHA256318af7b8ea87ea5778c696c3b77a5337327d9e781fddc4221721b01b857af4de
SHA512d6456f98fb50ba4180017f2db2f42b908b4694078da57a7089b1b6a68715d5c6f6d1008e3509f0b2e6ca009d07e05a20363a75a512ba65853fd036e0702f7dfd