Analysis
-
max time kernel
89s -
max time network
84s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
a1092881155acdbb3bc6ec80c4817aefdf421486dd7a3ed768da45a9bdbdec29.exe
Resource
win7-20240508-en
General
-
Target
a1092881155acdbb3bc6ec80c4817aefdf421486dd7a3ed768da45a9bdbdec29.exe
-
Size
62KB
-
MD5
e256efc0b1ac19a63d82f6a16ce8a7f6
-
SHA1
0be73fbe57906ff03feb9a30de6b6ae4774f4c64
-
SHA256
a1092881155acdbb3bc6ec80c4817aefdf421486dd7a3ed768da45a9bdbdec29
-
SHA512
392d82f6cd8a15f98c4424bb485df89841472426811ac62456c47a38ad75b65a80248b5b839ffc847770b1893973bec03000047672da391840bed8ce7ae18a4a
-
SSDEEP
1536:6bQx5oPsr2vFxDPhAvzgAQzFZ77MzeTmv:6bQRSHpAvzyf7MzeTK
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a1092881155acdbb3bc6ec80c4817aefdf421486dd7a3ed768da45a9bdbdec29.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation a1092881155acdbb3bc6ec80c4817aefdf421486dd7a3ed768da45a9bdbdec29.exe -
Executes dropped EXE 1 IoCs
Processes:
biudfw.exepid process 2420 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a1092881155acdbb3bc6ec80c4817aefdf421486dd7a3ed768da45a9bdbdec29.exedescription pid process target process PID 2376 wrote to memory of 2420 2376 a1092881155acdbb3bc6ec80c4817aefdf421486dd7a3ed768da45a9bdbdec29.exe biudfw.exe PID 2376 wrote to memory of 2420 2376 a1092881155acdbb3bc6ec80c4817aefdf421486dd7a3ed768da45a9bdbdec29.exe biudfw.exe PID 2376 wrote to memory of 2420 2376 a1092881155acdbb3bc6ec80c4817aefdf421486dd7a3ed768da45a9bdbdec29.exe biudfw.exe PID 2376 wrote to memory of 1424 2376 a1092881155acdbb3bc6ec80c4817aefdf421486dd7a3ed768da45a9bdbdec29.exe cmd.exe PID 2376 wrote to memory of 1424 2376 a1092881155acdbb3bc6ec80c4817aefdf421486dd7a3ed768da45a9bdbdec29.exe cmd.exe PID 2376 wrote to memory of 1424 2376 a1092881155acdbb3bc6ec80c4817aefdf421486dd7a3ed768da45a9bdbdec29.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1092881155acdbb3bc6ec80c4817aefdf421486dd7a3ed768da45a9bdbdec29.exe"C:\Users\Admin\AppData\Local\Temp\a1092881155acdbb3bc6ec80c4817aefdf421486dd7a3ed768da45a9bdbdec29.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:2420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD59a0ca70d5cead970d33f2017acf4b1a3
SHA17bc12d1b161cd41ec4097785498a0312c7f45df8
SHA25615758f2d5ec54e355738a5879908f2ab7a4e8accf1a42be0e32f811cc8d489ef
SHA51263f38645117124ca563d5182c0acdca381d4a2d9b472244d3fef7bf5f03cc8aca9fe9f0ef4800b43b9d38774bb8305df6e322c84d3fe915688fd56c50bf88027
-
Filesize
512B
MD5efd90b3ac908d5482af367de3a82184a
SHA1de9f01d2ed0247b7b347e55c5a09721a60147fb9
SHA25644f3db1bb73bb207a88008ae28d0399f888b5714ccccb2056f4148b4455e693d
SHA5126e3355f895af1d81887d5750033c5a139e4a0e1c2c928aeef1fd37f9c191e754b1f524d252c229ea5e744dbef4dd0a8240d9d3443651d42de198e82a197afb02
-
Filesize
338B
MD53feac038fd9387a7e8ba9c4483da0bad
SHA1d63b2cabecd06580d58aefee0d3932cd676c1045
SHA256ffee268766f57beebc12d5c88ee63532d5b902d876609aba8c30987beb1cf457
SHA5126005da05b2d957c961dbbdeae4b986207b5d154f0a49885e21eee492e7a54e9c32d9669417e7b0fcc692979f573f9e4d85c80f04701e185690d43273fc0e4134