Resubmissions

03/07/2024, 16:04 UTC

240703-thygmaycpc 10

01/07/2024, 18:12 UTC

240701-ws6xvswbkj 10

01/07/2024, 18:03 UTC

240701-wm5sls1gka 10

01/07/2024, 18:03 UTC

240701-wm39sa1gjf 10

01/07/2024, 18:03 UTC

240701-wm2e7avhkj 10

01/07/2024, 18:03 UTC

240701-wmzxcs1fre 10

01/07/2024, 18:02 UTC

240701-wmzats1frc 10

01/07/2024, 18:02 UTC

240701-wmvbwa1fqh 10

22/11/2023, 17:02 UTC

231122-vkac9adg64 10

Analysis

  • max time kernel
    145s
  • max time network
    84s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 16:04 UTC

General

  • Target

    5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe

  • Size

    669KB

  • MD5

    ead18f3a909685922d7213714ea9a183

  • SHA1

    1270bd7fd62acc00447b30f066bb23f4745869bf

  • SHA256

    5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18

  • SHA512

    6e532d9c3d186e4dac38823ae9152056346e283613f0caf088b21a1b3e5f4f6cf3bad8c407168b1072895a386e3be0b8c11ad1cb326d3d3ff0eb8562052def91

  • SSDEEP

    6144:bLUHLyHlwFjxDi2nEZkQ4NXxp0XMgkBWPqdN/jGdfYY7SRA7j4YlvfYAAjJ:4uFi02nEZh4jp0XLuxGdgTm73vL

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
    "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4348
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\b4afe514-0cdd-4ea8-baad-60aa3b6edf85" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:1820
    • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
      "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:428
      • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --ForNetRes "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1 IsNotAutoStart IsNotTask
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4308
        • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 4308 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3328
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 1252
            5⤵
            • Program crash
            PID:636
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 1272
          4⤵
          • Program crash
          PID:2956
      • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 428 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1660
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 1636
      2⤵
      • Program crash
      PID:436
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4348 -ip 4348
    1⤵
      PID:3988
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3328 -ip 3328
      1⤵
        PID:3408
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4308 -ip 4308
        1⤵
          PID:4960

        Network

        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          ymad.ug
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          ymad.ug
          IN A
        • flag-us
          DNS
          ymad.ug
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          ymad.ug
          IN A
        • flag-us
          DNS
          ymad.ug
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          ymad.ug
          IN A
        • flag-us
          DNS
          ymad.ug
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          ymad.ug
          IN A
        • flag-us
          DNS
          ymad.ug
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          ymad.ug
          IN A
        • flag-us
          DNS
          loot.ug
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          loot.ug
          IN A
        • flag-us
          DNS
          loot.ug
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          loot.ug
          IN A
        • flag-us
          DNS
          loot.ug
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          loot.ug
          IN A
        • flag-us
          DNS
          loot.ug
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          loot.ug
          IN A
        • flag-us
          DNS
          loot.ug
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          loot.ug
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
        No results found
        • 8.8.8.8:53
          api.2ip.ua
          dns
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          280 B
          5

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

        • 8.8.8.8:53
          api.2ip.ua
          dns
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          280 B
          5

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

        • 8.8.8.8:53
          ymad.ug
          dns
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          265 B
          5

          DNS Request

          ymad.ug

          DNS Request

          ymad.ug

          DNS Request

          ymad.ug

          DNS Request

          ymad.ug

          DNS Request

          ymad.ug

        • 8.8.8.8:53
          loot.ug
          dns
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          265 B
          5

          DNS Request

          loot.ug

          DNS Request

          loot.ug

          DNS Request

          loot.ug

          DNS Request

          loot.ug

          DNS Request

          loot.ug

        • 8.8.8.8:53
          api.2ip.ua
          dns
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          280 B
          5

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

        • 8.8.8.8:53
          api.2ip.ua
          dns
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          280 B
          5

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

          DNS Request

          api.2ip.ua

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\b4afe514-0cdd-4ea8-baad-60aa3b6edf85\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe

          Filesize

          669KB

          MD5

          ead18f3a909685922d7213714ea9a183

          SHA1

          1270bd7fd62acc00447b30f066bb23f4745869bf

          SHA256

          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18

          SHA512

          6e532d9c3d186e4dac38823ae9152056346e283613f0caf088b21a1b3e5f4f6cf3bad8c407168b1072895a386e3be0b8c11ad1cb326d3d3ff0eb8562052def91

        • memory/428-12-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/428-24-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/428-17-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/428-16-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/428-7-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/428-15-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/428-13-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/1660-26-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/1660-19-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/1660-31-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3328-34-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3328-33-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3328-28-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/4308-18-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/4308-21-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/4308-23-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/4308-30-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/4308-35-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/4348-2-0x0000000000600000-0x0000000000700000-memory.dmp

          Filesize

          1024KB

        • memory/4348-0-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/4348-9-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/4348-3-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/4348-4-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/4348-10-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.