Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:06
Static task
static1
Behavioral task
behavioral1
Sample
9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe
Resource
win7-20240220-en
General
-
Target
9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe
-
Size
6.5MB
-
MD5
99376ee4ed70611e27327a144ce46553
-
SHA1
49bdca60f10a3b2957824c16b0bc862224fb0d59
-
SHA256
9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db
-
SHA512
bcaa3490a23d7614aa888c6cd344d3f0a5c7a3ababdcc26646a6475ee3696c8d02a6930c9007cc2c149fff9881151dc0f81141626c511935aa64941a54954320
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSW:i0LrA2kHKQHNk3og9unipQyOaOW
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
UPX dump on OEP (original entry point) 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\mojoh.exe UPX behavioral2/memory/5020-70-0x0000000000400000-0x0000000000599000-memory.dmp UPX behavioral2/memory/5020-74-0x0000000000400000-0x0000000000599000-memory.dmp UPX -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exenowov.exebuguco.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation nowov.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation buguco.exe -
Executes dropped EXE 3 IoCs
Processes:
nowov.exebuguco.exemojoh.exepid process 1920 nowov.exe 2232 buguco.exe 5020 mojoh.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\mojoh.exe upx behavioral2/memory/5020-70-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/5020-74-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exenowov.exebuguco.exemojoh.exepid process 4080 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe 4080 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe 1920 nowov.exe 1920 nowov.exe 2232 buguco.exe 2232 buguco.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe 5020 mojoh.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exenowov.exebuguco.exedescription pid process target process PID 4080 wrote to memory of 1920 4080 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe nowov.exe PID 4080 wrote to memory of 1920 4080 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe nowov.exe PID 4080 wrote to memory of 1920 4080 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe nowov.exe PID 4080 wrote to memory of 460 4080 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe cmd.exe PID 4080 wrote to memory of 460 4080 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe cmd.exe PID 4080 wrote to memory of 460 4080 9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe cmd.exe PID 1920 wrote to memory of 2232 1920 nowov.exe buguco.exe PID 1920 wrote to memory of 2232 1920 nowov.exe buguco.exe PID 1920 wrote to memory of 2232 1920 nowov.exe buguco.exe PID 2232 wrote to memory of 5020 2232 buguco.exe mojoh.exe PID 2232 wrote to memory of 5020 2232 buguco.exe mojoh.exe PID 2232 wrote to memory of 5020 2232 buguco.exe mojoh.exe PID 2232 wrote to memory of 4036 2232 buguco.exe cmd.exe PID 2232 wrote to memory of 4036 2232 buguco.exe cmd.exe PID 2232 wrote to memory of 4036 2232 buguco.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe"C:\Users\Admin\AppData\Local\Temp\9f28507fa16d84eefa10b851f2a9ecdbdceade2af7a97b6d1974b75e8063b7db.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\nowov.exe"C:\Users\Admin\AppData\Local\Temp\nowov.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\buguco.exe"C:\Users\Admin\AppData\Local\Temp\buguco.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\mojoh.exe"C:\Users\Admin\AppData\Local\Temp\mojoh.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:4036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5994a5ec7e19de459ba156d24f14a6fe7
SHA15d30972269a7468f80267f13c6cafa156a5d0a56
SHA25632ffc0db52cc85930d31f5c997bac3c75c4349485bbf769f90a08e2de91806b8
SHA512ea24550e7787cc220fa9c13625bd40a4da03da671ab4f63677a5bc24055e5fe441c006fad716363f392c47b02d8e42674db8092d7db917a80846eb215023efe9
-
Filesize
224B
MD5ae4a9081a57d1c97b8ec91d28e3a56dc
SHA1efb57ac011fac06621bb8775c2fb944f1caf6b70
SHA256be7f633203439be4bcad8e4ebc3047e646cb12f89ce8597779dadaa77fd83e39
SHA512d5a88d75abfe2b95b62561426220c4a03decaa895ce13d37cec9f01c92e20e72809f632937e63c93b494dcd0246d9a25b7d446ae9183038a14b349f4071de183
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD59992314955f5a01f567f9bc7feed8f0c
SHA11338ae854db675326d10ed2ca17731de6b05bca2
SHA256bfe82e881b92d21cabc9ceb6156559d7ce2d597f27d20920880d41f6e9997452
SHA512ec83750e89cb4a8c41d9335c9fd78bec9740c52b9c2299b31743dc81c247b3ac345cb891ce1b2cdd58fa8019848d6da85e1cbb6b00ec79f2908cf2124f1e32f9
-
Filesize
459KB
MD50c1bd6239e26ff8ea2043e88a2718c74
SHA1e86c9d86ecd2feb31dca755e65a1485e32ed64c9
SHA256eec9aee3d47a18a39f7e77ac650463ba0bab156cd2305ff6f78271f2eb361bad
SHA5122d60b6f047a76ae857b674fbb457048dc25ff9a4cfa4fccf724efd516b37902c6e5217dcc11c7f2c16df927b7c39f4d77f22401b4715beb7b37ee2f64be73099
-
Filesize
6.5MB
MD550b25aaae5c5e305395bd615825c8209
SHA16e2f1d2d12698998a97e8a4f35a8d9c5b7cc2d7d
SHA256fdf73257e683f4ef74d942da25f5fd809fce0feda385597443d751bcb9e3cba9
SHA51262400f2dbebb92fff8e5ec0c57fcca6baa2282140b6cca8596b4ad3e1bb2a320c691f468181dcaca8a305087190bd6f39fca90cd2f6c61c6ddb2800095027d0d