Analysis
-
max time kernel
136s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 04:24
Static task
static1
Behavioral task
behavioral1
Sample
de42e7e0382a534dfbf940e3217401485672d27554c46b08239d71c8df0aa5c1.exe
Resource
win7-20240508-en
General
-
Target
de42e7e0382a534dfbf940e3217401485672d27554c46b08239d71c8df0aa5c1.exe
-
Size
66KB
-
MD5
3249d05491763fe671eb6158a8e7c1ce
-
SHA1
1256dd6f0ee7f5c35a9f025c2ef57e95260f578a
-
SHA256
de42e7e0382a534dfbf940e3217401485672d27554c46b08239d71c8df0aa5c1
-
SHA512
008e244778a4e6b61d455cdb2e65c65029a6afb05673a9640f9bb24ffb510e72814f87914402630b2ba8149595a7b1ec14951f1dfcd93054e60fff59a5fd4e04
-
SSDEEP
1536:04/WgLAjdZsp+uChoLnDeoqYAJjvLFymnHsPZ:l//AjMp+u2onejH2PZ
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
de42e7e0382a534dfbf940e3217401485672d27554c46b08239d71c8df0aa5c1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation de42e7e0382a534dfbf940e3217401485672d27554c46b08239d71c8df0aa5c1.exe -
Executes dropped EXE 1 IoCs
Processes:
biudfw.exepid process 4492 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
de42e7e0382a534dfbf940e3217401485672d27554c46b08239d71c8df0aa5c1.exedescription pid process target process PID 1924 wrote to memory of 4492 1924 de42e7e0382a534dfbf940e3217401485672d27554c46b08239d71c8df0aa5c1.exe biudfw.exe PID 1924 wrote to memory of 4492 1924 de42e7e0382a534dfbf940e3217401485672d27554c46b08239d71c8df0aa5c1.exe biudfw.exe PID 1924 wrote to memory of 4492 1924 de42e7e0382a534dfbf940e3217401485672d27554c46b08239d71c8df0aa5c1.exe biudfw.exe PID 1924 wrote to memory of 380 1924 de42e7e0382a534dfbf940e3217401485672d27554c46b08239d71c8df0aa5c1.exe cmd.exe PID 1924 wrote to memory of 380 1924 de42e7e0382a534dfbf940e3217401485672d27554c46b08239d71c8df0aa5c1.exe cmd.exe PID 1924 wrote to memory of 380 1924 de42e7e0382a534dfbf940e3217401485672d27554c46b08239d71c8df0aa5c1.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de42e7e0382a534dfbf940e3217401485672d27554c46b08239d71c8df0aa5c1.exe"C:\Users\Admin\AppData\Local\Temp\de42e7e0382a534dfbf940e3217401485672d27554c46b08239d71c8df0aa5c1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:4492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD529935d529c707a9da8ed1be7c28dea58
SHA149f39c25f1f1bc5139d882ba5f448c95e2e14783
SHA256a00f9d60402aa3eef3c3f51511904f6fde160f7fb7ac9c718cbf05885b4ac81f
SHA512646e56efe294e6bb63624c5d5cadbf1d288724b6808672ad6a67c53f76a6dce9e6e7a680aed6dfc8f44ac023cbb9244184e7ec0d4bcb80f5ca561384d8b7f003
-
Filesize
512B
MD5a250860c0687ed9dda488805c025a2d2
SHA10c181ed3b46463d35631ca169f0928c33a1da389
SHA2563947c34dfc780b424a3207c6ebe12f667bcb839733107f7a94fe495ec705cb37
SHA5120286fcd24203ef574c9fc37200e4b0e65d58296162aa89b5424ab48b814bd237e609ab7eaf42a69bdad2ab6414bfbbfaec4757e28b29c69752e0e65a653f665a
-
Filesize
338B
MD5581c92539834f7e703633bda3011c72d
SHA1e301bf0a2d466de27b8fa51d5cda8e4f6967a768
SHA2564c93db9f5ee22cfa7016804bf800e0b4cc7bb2d4111a582d5f5e57ab91ed3996
SHA51241351134f8b3f6b0a28e8960dee9b119cf4a04c7e3f63007501183d330385a452bbc2c87f4de38de2fe8c411bef31c8d8c4c8052361b030d133ab4b0e1d573ff