Analysis
-
max time kernel
150s -
max time network
80s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 00:28
Behavioral task
behavioral1
Sample
8e8fd100abf60b66cc45b97db2fa438c63b06fc6e7b233e9655605441b897cfc.exe
Resource
win7-20240221-en
General
-
Target
8e8fd100abf60b66cc45b97db2fa438c63b06fc6e7b233e9655605441b897cfc.exe
-
Size
359KB
-
MD5
dfb3779c551d4ee4e50a4621b6145411
-
SHA1
6a0cb76aa520332950e67d3f9a99ee425f50626a
-
SHA256
8e8fd100abf60b66cc45b97db2fa438c63b06fc6e7b233e9655605441b897cfc
-
SHA512
5940eb5edab888cbee06ef9d34c03f651f62824ac7915f005037e4df47f84da07703be8b88ae9eb8a3ae5cb5a343f871d4fb5a144e077ae5a679a033976bc717
-
SSDEEP
6144:c1bYec5C8AAYLxhEmPG7qwmioqVsCqbN0hx:MUyI6QmPPPqVspa
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
puubx.exepugoxi.exe8e8fd100abf60b66cc45b97db2fa438c63b06fc6e7b233e9655605441b897cfc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation puubx.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation pugoxi.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 8e8fd100abf60b66cc45b97db2fa438c63b06fc6e7b233e9655605441b897cfc.exe -
Executes dropped EXE 3 IoCs
Processes:
puubx.exepugoxi.exeytduw.exepid process 2756 puubx.exe 528 pugoxi.exe 4680 ytduw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ytduw.exepid process 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe 4680 ytduw.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
8e8fd100abf60b66cc45b97db2fa438c63b06fc6e7b233e9655605441b897cfc.exepuubx.exepugoxi.exedescription pid process target process PID 4076 wrote to memory of 2756 4076 8e8fd100abf60b66cc45b97db2fa438c63b06fc6e7b233e9655605441b897cfc.exe puubx.exe PID 4076 wrote to memory of 2756 4076 8e8fd100abf60b66cc45b97db2fa438c63b06fc6e7b233e9655605441b897cfc.exe puubx.exe PID 4076 wrote to memory of 2756 4076 8e8fd100abf60b66cc45b97db2fa438c63b06fc6e7b233e9655605441b897cfc.exe puubx.exe PID 4076 wrote to memory of 1288 4076 8e8fd100abf60b66cc45b97db2fa438c63b06fc6e7b233e9655605441b897cfc.exe cmd.exe PID 4076 wrote to memory of 1288 4076 8e8fd100abf60b66cc45b97db2fa438c63b06fc6e7b233e9655605441b897cfc.exe cmd.exe PID 4076 wrote to memory of 1288 4076 8e8fd100abf60b66cc45b97db2fa438c63b06fc6e7b233e9655605441b897cfc.exe cmd.exe PID 2756 wrote to memory of 528 2756 puubx.exe pugoxi.exe PID 2756 wrote to memory of 528 2756 puubx.exe pugoxi.exe PID 2756 wrote to memory of 528 2756 puubx.exe pugoxi.exe PID 528 wrote to memory of 4680 528 pugoxi.exe ytduw.exe PID 528 wrote to memory of 4680 528 pugoxi.exe ytduw.exe PID 528 wrote to memory of 4680 528 pugoxi.exe ytduw.exe PID 528 wrote to memory of 452 528 pugoxi.exe cmd.exe PID 528 wrote to memory of 452 528 pugoxi.exe cmd.exe PID 528 wrote to memory of 452 528 pugoxi.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e8fd100abf60b66cc45b97db2fa438c63b06fc6e7b233e9655605441b897cfc.exe"C:\Users\Admin\AppData\Local\Temp\8e8fd100abf60b66cc45b97db2fa438c63b06fc6e7b233e9655605441b897cfc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\puubx.exe"C:\Users\Admin\AppData\Local\Temp\puubx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\pugoxi.exe"C:\Users\Admin\AppData\Local\Temp\pugoxi.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\ytduw.exe"C:\Users\Admin\AppData\Local\Temp\ytduw.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:452
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:1288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5d39bff0c204a4b32f12a70e423230646
SHA1421fc33bad6c5309dec4aebc77cde5a0e4854a69
SHA25639fad9c63cac7ef7546a6c9ec8df759c9182dfe9bac6a1d359ab413c72c10aa7
SHA51296ba3464549ee28bf70cd61c167d808fe54d1804d13ed6f053435e3fba6fc1c871c790af84c4f0352ebe447e413e6e30be1b789cdcc289b9f1d5b6da7235e1d1
-
Filesize
224B
MD5909822f3de22d3574f8c7ce0aa97272c
SHA1bd6dc50faba207d27f595f4b2693efe12ae5bb91
SHA256fbf2824a3b1524b2e4df37846b2dcceb5d2a6cc65b8e5031734791f7dc7ae7f9
SHA51283c9939a24c6cabe40409b7fc5c82a5a613f12645288b51b49cceb94892efe274bf34024d49dcf01900101d24d2bed2f6376f3e07214f0903d86a87e19372d32
-
Filesize
512B
MD586681f80624c48f69e0219d1eb6c5023
SHA176229a5ef10658c61d09377b44ecc81641530d9e
SHA2563ed8b2f6326fe5c7aaf1f2eb54ef703ee2bc6f9a5af5b85b029406b69dc945aa
SHA5125fec61f9a254286703f0bb6c86a24b1bd3102c39499f730220aa29bdeabbd93e5162fe86444bcec50e1c2a965c1aa602ea397b37aa8a8740ac7b74eade34e169
-
Filesize
359KB
MD51066779d886fbdc60111748e39b54c19
SHA1bc4b1a3381bb403cf0b4afc75601fe692ada4427
SHA25644f41ab6aa3510782dd7a3392a16993b0c5317771bc05567a87a4796e73c56a6
SHA5126a3e7409e46c69b6d06b200bea0b6ed4bd5cc2cf6fc33842056df37009ebe5313de4f4ea90f2f107276ad748345342d08a5b9663d43b429051809f022da25fd9
-
Filesize
107KB
MD508371b6c9738ef12003f7124bf134441
SHA186b0e0d9e00e5f2e3398713fee35cdd1baf90671
SHA256453ea190cecb4c2a680b331d5df057fd41cd40354eecbc27418c5afb77fb6fb7
SHA51287c5dc309a2a59d578f522f00c82231a27955324d517a2c74b3534528cbef0cc28dc1c0b11b7a83fc12d2f5220c185e25b456558ff8505770c77327afc272c39