Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 22:02
Behavioral task
behavioral1
Sample
53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe
Resource
win7-20240221-en
General
-
Target
53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe
-
Size
505KB
-
MD5
e82dc2f700675d613eb9d3539e110979
-
SHA1
58a1c5e1c2ab44aef6e7a20e87b929c997e4ef8b
-
SHA256
53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe
-
SHA512
f489519b78f3242951a83c08133db7dd752316ae520b8833cd47f9170ef6d92c9e8902a49bbad556311fa74d9114994ae3fcca5d6b2720f775ef8b346ac3b601
-
SSDEEP
12288:6uGtVfjUBSaoINAHT19UWvMucSlFgIOguNvP/6x5:6bt2/NA3UWUuBlFLUvax5
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bakid.exe53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation bakid.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe -
Executes dropped EXE 2 IoCs
Processes:
bakid.exejylyx.exepid process 3376 bakid.exe 4672 jylyx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
jylyx.exepid process 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe 4672 jylyx.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exebakid.exedescription pid process target process PID 2356 wrote to memory of 3376 2356 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe bakid.exe PID 2356 wrote to memory of 3376 2356 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe bakid.exe PID 2356 wrote to memory of 3376 2356 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe bakid.exe PID 2356 wrote to memory of 2636 2356 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe cmd.exe PID 2356 wrote to memory of 2636 2356 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe cmd.exe PID 2356 wrote to memory of 2636 2356 53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe cmd.exe PID 3376 wrote to memory of 4672 3376 bakid.exe jylyx.exe PID 3376 wrote to memory of 4672 3376 bakid.exe jylyx.exe PID 3376 wrote to memory of 4672 3376 bakid.exe jylyx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe"C:\Users\Admin\AppData\Local\Temp\53f590f0c72e4724ebe8957bf761a64f83534c22faae816df6cd9da8ce40b8fe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\bakid.exe"C:\Users\Admin\AppData\Local\Temp\bakid.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\jylyx.exe"C:\Users\Admin\AppData\Local\Temp\jylyx.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:2636
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4056 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5d0025df6a661a237ab2a386a04300dd9
SHA1c6cd0b9269551595fee1082d6fb70613c071f4df
SHA2568acc6487d10a6c4d45ec607e4a0db85c00ed7314aaed7a0fd01db409420d1ecf
SHA512f90e63f47dceaa85ffffb0e42fd44fe347dd4fe2e33ed3e3b7b3d4a485f0aaf7df06ac21f8921cdd4d5e249d68cc0f0fc4303a282b1505d2eb036e41b9d23ac3
-
Filesize
505KB
MD5a619534c532e3adb1bf58bd855bec5a3
SHA10056d6f191b37a454c2e37aa4bf377e03c917f56
SHA256e5250fc54569fc7f959dee0f8ed270c0571ace3708bf7a42a883babdda9c9e35
SHA512b3a493229787a64bd64449851e9a21ad47bcc2d99029b513b6ab84c368d74e3a755862418b9ac21d5be21d1eb1736a9b02ff62968a3a903d8c6cdec02186aa2e
-
Filesize
512B
MD56fdb837d951eaef6f97bf3043cddd001
SHA1696d9b7c2d88fd2e2cb2f8d6bb90b0839aa03599
SHA256f9f2b7dbe515d375b8639a9f8b9eb8ea4fbe8e39c19ba6e323977cd0044f8e42
SHA5120bac0cd7373eee76bf6de35126395fbdf15ddd08b433ca2abfbb0e566af137b238fe1de88d2ec6b53e14792e4b6f6d36549d8300d4cd6052c3caaf34b169743c
-
Filesize
186KB
MD50bdb23739c9c2a9b6559b451c6f90a66
SHA1be0107b031d0f984badcd83bd30ab6b129489efa
SHA2567eeaa098150c5e9ad4422cad9b31450d11d4f6ab8dac4a7997c5259b607b8f5a
SHA51250249759080303be1d06e84fb9b26bb556202e151463e85daf672a0e98f7319e37bae693258783c0ca5b0b4073f2998ce02b24da635bacb7b2201afa34ebb088