Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 22:37
Behavioral task
behavioral1
Sample
5363b7cc15bc76f5097a2836e8c8bc0c.exe
Resource
win7-20240221-en
General
-
Target
5363b7cc15bc76f5097a2836e8c8bc0c.exe
-
Size
412KB
-
MD5
5363b7cc15bc76f5097a2836e8c8bc0c
-
SHA1
61a82c0b1cb95e875ab06ee7a4dc08098f204a8d
-
SHA256
43d080a43009395ba1e85c202bf12804fc5ab128e79cfeeab7f359a1235a303f
-
SHA512
215235b086985dc420353ddb9a23407acd111851b05cfcd63ad7a80c15f1e6a78792fe010b11ff336b3ac2d4f87b4ae2bc132f6a20be926b4232a2f34b7b5535
-
SSDEEP
6144:GzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInODgs:oU7M5ijWh0XOW4sEfeO8s
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
resource yara_rule behavioral2/files/0x0003000000000707-21.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation 5363b7cc15bc76f5097a2836e8c8bc0c.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation vuqoo.exe -
Executes dropped EXE 2 IoCs
pid Process 3768 vuqoo.exe 4044 cocil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe 4044 cocil.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3260 wrote to memory of 3768 3260 5363b7cc15bc76f5097a2836e8c8bc0c.exe 89 PID 3260 wrote to memory of 3768 3260 5363b7cc15bc76f5097a2836e8c8bc0c.exe 89 PID 3260 wrote to memory of 3768 3260 5363b7cc15bc76f5097a2836e8c8bc0c.exe 89 PID 3260 wrote to memory of 4204 3260 5363b7cc15bc76f5097a2836e8c8bc0c.exe 90 PID 3260 wrote to memory of 4204 3260 5363b7cc15bc76f5097a2836e8c8bc0c.exe 90 PID 3260 wrote to memory of 4204 3260 5363b7cc15bc76f5097a2836e8c8bc0c.exe 90 PID 3768 wrote to memory of 4044 3768 vuqoo.exe 100 PID 3768 wrote to memory of 4044 3768 vuqoo.exe 100 PID 3768 wrote to memory of 4044 3768 vuqoo.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\5363b7cc15bc76f5097a2836e8c8bc0c.exe"C:\Users\Admin\AppData\Local\Temp\5363b7cc15bc76f5097a2836e8c8bc0c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\vuqoo.exe"C:\Users\Admin\AppData\Local\Temp\vuqoo.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\cocil.exe"C:\Users\Admin\AppData\Local\Temp\cocil.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:4204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD55c8c644dd14b15c274f17148997925a7
SHA12c98525c3cf577985df0bbcbfe1e6755564a3846
SHA256a271df78c3e50b046fa7f9ead16c52238584282385052018c6348bc0a4b61588
SHA51283e2a976b1fb5b99dc130661a45d83506ea58d94ee1d07a027b904f8f3955078815dbbb1102a910261a5960f9b00193f7e317e73b5f335c68d2dba1fd8b374da
-
Filesize
212KB
MD579cd84cf4a464b55f46c095af0efe4ca
SHA1aa5e9992624e309933396dff2c08a389b24b769d
SHA2567e135286058c56c5b42c24185cb6565fd0e502b23cda02ef69bdec7321c9cc7f
SHA5128529ed58a5d27dd76099e534a7de2693063bd76e2c157cc4e87048c629d585bd94baeb63ec24d534035a191af640680a3f716721e256d95cabaad89155792ecb
-
Filesize
512B
MD53cbd3a4566b01726e37637a20c0037d6
SHA1638828cf62c8f9c82da06a3ce628ad34a7423e8d
SHA2561834f99e6c24f551840a093a2056e711b99699fcc104c6f8166ccee92b24b637
SHA5129022b9174096b7377311918a16efaeb4b48b9120ef3c603587336d4a30d8056b2d566b8828f26f9dd9c4cd4ad2cd8a4731a095a757b8f7b336b9c4f4017516a9
-
Filesize
412KB
MD5f4a05aa567c98b23e5d48e753a454686
SHA19988ce575698e92b9bec56663656cb1183333756
SHA256b184ff10c5c7f37edbdc1c95bae67d3a7eac2e96a78473fba9721596bf56a850
SHA512ebf3b92baec29f87ce3e1013187a51ad812ebdaf6cf1d82a3b56303695498fcf4943d9a140dc3bb588fdec247876742dddefd00e63a766f9ffad771572b0a2d4