Analysis
-
max time kernel
150s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 21:09
Behavioral task
behavioral1
Sample
4e6426da25aa1bc008d7f8379b6dd0a17f0441ac3f64ec205e5740e31420edb3.exe
Resource
win7-20240611-en
General
-
Target
4e6426da25aa1bc008d7f8379b6dd0a17f0441ac3f64ec205e5740e31420edb3.exe
-
Size
412KB
-
MD5
5368154c00258fc3ff4cdcde198728d8
-
SHA1
739a2fce2fe90bb4dd07de1c1805057b4702c90f
-
SHA256
4e6426da25aa1bc008d7f8379b6dd0a17f0441ac3f64ec205e5740e31420edb3
-
SHA512
d0404546c4606183ce442ad27a3d4971fea9e98443f90a8a34a2e6e2c2baedfdabcbbe74287e1e24c964166c81095e59b5fc90efd094fa7a11257bbad468ea1e
-
SSDEEP
6144:GzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInODgb:oU7M5ijWh0XOW4sEfeO8b
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\voyfy.exe aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4e6426da25aa1bc008d7f8379b6dd0a17f0441ac3f64ec205e5740e31420edb3.exeleryi.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 4e6426da25aa1bc008d7f8379b6dd0a17f0441ac3f64ec205e5740e31420edb3.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation leryi.exe -
Executes dropped EXE 2 IoCs
Processes:
leryi.exevoyfy.exepid process 1472 leryi.exe 4804 voyfy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
voyfy.exepid process 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe 4804 voyfy.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4e6426da25aa1bc008d7f8379b6dd0a17f0441ac3f64ec205e5740e31420edb3.exeleryi.exedescription pid process target process PID 4404 wrote to memory of 1472 4404 4e6426da25aa1bc008d7f8379b6dd0a17f0441ac3f64ec205e5740e31420edb3.exe leryi.exe PID 4404 wrote to memory of 1472 4404 4e6426da25aa1bc008d7f8379b6dd0a17f0441ac3f64ec205e5740e31420edb3.exe leryi.exe PID 4404 wrote to memory of 1472 4404 4e6426da25aa1bc008d7f8379b6dd0a17f0441ac3f64ec205e5740e31420edb3.exe leryi.exe PID 4404 wrote to memory of 1452 4404 4e6426da25aa1bc008d7f8379b6dd0a17f0441ac3f64ec205e5740e31420edb3.exe cmd.exe PID 4404 wrote to memory of 1452 4404 4e6426da25aa1bc008d7f8379b6dd0a17f0441ac3f64ec205e5740e31420edb3.exe cmd.exe PID 4404 wrote to memory of 1452 4404 4e6426da25aa1bc008d7f8379b6dd0a17f0441ac3f64ec205e5740e31420edb3.exe cmd.exe PID 1472 wrote to memory of 4804 1472 leryi.exe voyfy.exe PID 1472 wrote to memory of 4804 1472 leryi.exe voyfy.exe PID 1472 wrote to memory of 4804 1472 leryi.exe voyfy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e6426da25aa1bc008d7f8379b6dd0a17f0441ac3f64ec205e5740e31420edb3.exe"C:\Users\Admin\AppData\Local\Temp\4e6426da25aa1bc008d7f8379b6dd0a17f0441ac3f64ec205e5740e31420edb3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\leryi.exe"C:\Users\Admin\AppData\Local\Temp\leryi.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\voyfy.exe"C:\Users\Admin\AppData\Local\Temp\voyfy.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:1452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5f5bd7a59ba3abf60edc51a0422614a48
SHA1b7c1ec084994d4688b98033444dd8da8ae24ab97
SHA256edeb4a37e910f9dcc92fb47dece92553d45f8addf35b0618e8cb4fec56b9ac63
SHA5122fd82bc0efff667fd12a66676c11b3bd4d254613dfe7805aad1eb5d6196c47b75d686e1de6f170fbbbfd2b96e2a811786b2ba30c8b1c7912a4918e56f635790f
-
Filesize
512B
MD566f4bfa94bb6e45916a0a966bea93b38
SHA1da58c645e06cae60f960d1e5321ece3d4f7daf28
SHA2560d761bac3619a61ce8c45a8b237b7bb213bc3c5ddef31cbbfe8ea159800cbb4e
SHA512ec91c5bcd9172c858c9e2b2c57afb243553864cbeda5d8314ef52a62f1fe3542e7878f768f928a3de05900f50772c45ee66d01519be94e95f00096a36127c113
-
Filesize
412KB
MD5bb3f69809f46dea8aa0389ef2d49a8dd
SHA1d0e0e2134138976e6b834df39fd1a3b9875e98ff
SHA256455d19119f260fee4bb23699a77cbbc030c28b50d356dada83786e5b838504a2
SHA512859ec4336ec513e53f78fa44621da0fe4c1c3f56d8c5e05a990dcf008db7504c6e8d6df2e7b45adf2cee2e71bbd2c3f0d6d83b7b71005c122ccaa25ec276c695
-
Filesize
212KB
MD58ad558f5a42fa2c6c4906a2ae9cc8137
SHA1d5ed3240fbe386438df303e120f927490d627a23
SHA2560bc4515ea4685d45001ba22c5eea0b65ddc0863383085b76dfb155e100f0c3ed
SHA51246a16a0e48dd9cf84eb91936f56581ac91db9c24e325047fcd41291d011adf7ebd1fcfe3b220b79377e14fcddf3356d5581b489eb098c3bbd8e17b4e38f73cca