Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 19:25
Behavioral task
behavioral1
Sample
3c84aa3f8f46669648f51b150afe8494.exe
Resource
win7-20240221-en
General
-
Target
3c84aa3f8f46669648f51b150afe8494.exe
-
Size
487KB
-
MD5
3c84aa3f8f46669648f51b150afe8494
-
SHA1
c073c74728a82c76246ca285f7f136a4615a0518
-
SHA256
f0f21e5facff46ddd12b0062afd60e748c017cf2e701b6aacda1b80dc045b921
-
SHA512
a5b5afa48ce1234881d2ab3d9d819303b4f54470b5abaca51854a437cac3bb4f70e32feaba95c6ba3dafddef35b3e8daa3b8d70efe8507d484485e1606da76af
-
SSDEEP
12288:cpbfVlu0agWfZlnxgmEpZGsrUs99uDEq5EGDFhH:cpbGRZxSfGCUs99hq5Jf
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation muyju.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation 3c84aa3f8f46669648f51b150afe8494.exe -
Executes dropped EXE 2 IoCs
pid Process 4204 muyju.exe 4768 opden.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe 4768 opden.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 316 wrote to memory of 4204 316 3c84aa3f8f46669648f51b150afe8494.exe 88 PID 316 wrote to memory of 4204 316 3c84aa3f8f46669648f51b150afe8494.exe 88 PID 316 wrote to memory of 4204 316 3c84aa3f8f46669648f51b150afe8494.exe 88 PID 316 wrote to memory of 3312 316 3c84aa3f8f46669648f51b150afe8494.exe 89 PID 316 wrote to memory of 3312 316 3c84aa3f8f46669648f51b150afe8494.exe 89 PID 316 wrote to memory of 3312 316 3c84aa3f8f46669648f51b150afe8494.exe 89 PID 4204 wrote to memory of 4768 4204 muyju.exe 99 PID 4204 wrote to memory of 4768 4204 muyju.exe 99 PID 4204 wrote to memory of 4768 4204 muyju.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c84aa3f8f46669648f51b150afe8494.exe"C:\Users\Admin\AppData\Local\Temp\3c84aa3f8f46669648f51b150afe8494.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\muyju.exe"C:\Users\Admin\AppData\Local\Temp\muyju.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\opden.exe"C:\Users\Admin\AppData\Local\Temp\opden.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:3312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD5857ffe3a149b4e207542754d4db81285
SHA1345193fb480d2baeba2455414be80685354f7e51
SHA2564b76eb2d49730cb70c6eaf5389846dfa7f04f8bf88d54ae6537ad6204dec5ca8
SHA5121cab78a9dc14d53f520a404f33b2c4f5d8aa49e1e3ddba23ee8afdb6ba783c8e1c53f225197fa27c50a7b6f67f63602b3ed0ff459230fb5bbeab3313cb3c9d51
-
Filesize
512B
MD57386cd9472dac65253a451aab3c69b2e
SHA12bb7ff31b6f08addc50e31580f25dc3cbb07492c
SHA2566124fab5ae384514ee72bfa57adf161813e625ccba41b5ec2203ef2443db0fe5
SHA51207de158b87bee7f495300a774e0fd18831047eb54ca018bf351463225e2f951e0b45390c4d1cd02e50a60e92cb89233e4b4d0c7eb75c3266beee2db2906bd7e0
-
Filesize
487KB
MD51140a66d409353fb56a46fc45ef5d636
SHA1cab48e22b0ccead19b7c164cc60d6ea4dccf5351
SHA256f54da541d09358c0efd875f18a233b1ecfe649a52c2885bbb5b0c8caac740080
SHA512cd07773a91a3dc79e68aa34550814d25beaf2bb9f6e11d2eeebfc950e0e2c06f567cbdb2cfa19bca69ab77cb7f3634c5cd0a5e174d95ab49ed3970d3084e2cf9
-
Filesize
178KB
MD53db74541a359f0fc4df46103aea56338
SHA121ab5fd7790fd327689ba8a2a396ac2b1bccb919
SHA25621b211575fe32ca0f7647f0ef91794ebe18905d3461752d37c63761655523893
SHA512d307faa7739a1001a74c9c2f618c3793d45545752ee129bcedbe45867d040c8a992112e77757ac01c2847625fc9a695145444adc23e108a0c57ea795b8053d2b