Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
6962866cc5d9b288b73b4f6de36dc460.exe
Resource
win7-20240508-en
General
-
Target
6962866cc5d9b288b73b4f6de36dc460.exe
-
Size
97KB
-
MD5
6962866cc5d9b288b73b4f6de36dc460
-
SHA1
7eb27ad51e37ade9c46c686902deee88f71c26d8
-
SHA256
59f1e35f9db3a96096bb38273e9b3c76705c85c9338c961e9b669d43bb36a697
-
SHA512
fb01980523024b87376e8e711c53d608134a2d919cef318c8ae87f8ba036e51ea9744054b39ab1663731032c6e22e96297ebad39b1de58b372ec8b101335293a
-
SSDEEP
1536:nwhq8V9IpPf2lgiIJ4pivJnuNVueC39GdBR3M9cwK:nqV9MziU4piRun7C3CP3M+
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.209
112.175.88.207
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 6962866cc5d9b288b73b4f6de36dc460.exe -
Executes dropped EXE 1 IoCs
pid Process 348 huter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2384 wrote to memory of 348 2384 6962866cc5d9b288b73b4f6de36dc460.exe 92 PID 2384 wrote to memory of 348 2384 6962866cc5d9b288b73b4f6de36dc460.exe 92 PID 2384 wrote to memory of 348 2384 6962866cc5d9b288b73b4f6de36dc460.exe 92 PID 2384 wrote to memory of 432 2384 6962866cc5d9b288b73b4f6de36dc460.exe 93 PID 2384 wrote to memory of 432 2384 6962866cc5d9b288b73b4f6de36dc460.exe 93 PID 2384 wrote to memory of 432 2384 6962866cc5d9b288b73b4f6de36dc460.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\6962866cc5d9b288b73b4f6de36dc460.exe"C:\Users\Admin\AppData\Local\Temp\6962866cc5d9b288b73b4f6de36dc460.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
PID:348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5248 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:4060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD502167b944a214fee3d34f9a7e356dc6a
SHA1ca5b3f38a7151268726401593eb35f9b67bdde97
SHA25677fcdadc9ba56daa81edb3f0ef876e38a8c7de56187c28c7d02992cd9e0a243d
SHA512c8976c66724d737105a66699673052d7bc7f1e1941c91e03f97452aaba714d35b1d55434e950b00c58626b8bcf16186a731cccc503b7ba08f080ead3eaca5817
-
Filesize
97KB
MD5bd1c17401d591061b14b49863c9da3fd
SHA1816b78da87784f4d903bf88249b8a1addecb7c55
SHA256a6ebbc74c22abd53594d966bbe3255130d3e6974422502a0abd2b25222a4084f
SHA5128dfb6d25ca708bbfed48b1b26f58cbc779b4942e31e4778f5f36f3f98a0a2cc0d723766683c8ae086231e800c8f5787bf6d678db50c048730bb79e9ceca5f673
-
Filesize
274B
MD54ffaa123401a9152e31914c77afee89a
SHA112f36f5c079e5cd3f73a4afd56d9a40094dbded5
SHA256ccd26bda27d907381ab8f499425d1e71466121f2823fd48e646cf4e805f18913
SHA5123bac66ad94aeaef0693af468a162f2079f00d2b243d00f9af9c0e959624183a57c91d8a9404b5e54c610ce16ab2c62e478258a18db79090f84b2f236c0f39c3a