Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 03:00
Static task
static1
Behavioral task
behavioral1
Sample
a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exe
Resource
win7-20240708-en
General
-
Target
a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exe
-
Size
55KB
-
MD5
a495b30ea6e8f8d53ac6a02405931025
-
SHA1
6335bbe44c4924519cb58f345add3afcd801f4af
-
SHA256
a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38
-
SHA512
31832b86adb1b465688ab7a2ecc25136b77709c839643c2d793afcad999eac7581734acfc020c37ebed547897c312a61f2adef83b9c125a6dd7b97c551fc0de4
-
SSDEEP
1536:vMcQYte55zs091Zw9FAGDdJYipvwGf9ogjrgH1:vMhAe5Zs091KI+JYixw49XjrE
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exe -
Executes dropped EXE 1 IoCs
Processes:
biudfw.exepid process 3068 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exedescription pid process target process PID 2908 wrote to memory of 3068 2908 a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exe biudfw.exe PID 2908 wrote to memory of 3068 2908 a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exe biudfw.exe PID 2908 wrote to memory of 3068 2908 a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exe biudfw.exe PID 2908 wrote to memory of 3992 2908 a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exe cmd.exe PID 2908 wrote to memory of 3992 2908 a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exe cmd.exe PID 2908 wrote to memory of 3992 2908 a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exe"C:\Users\Admin\AppData\Local\Temp\a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:3068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:3992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD57408017bf69aff3523679e496bfe08db
SHA17af91496a5e6bd67bf2a61b16293fb765352bd20
SHA256174be4765367a188a65520dd468442443d87a92970d7cf7b2f8f629284b1060c
SHA512075c93fa0598208d1fed5ad9d2e157070c396d86c6e747d1036ca0f42a6bda519e342ad8247b21e3d14389d3418d959f22aa4cd9d4018ed1aa1979912b54fff3
-
Filesize
512B
MD5b4a86880004da8726288d7ec954885a8
SHA11bab1cfbdc2c540246210bc7852f8fe7e8357b31
SHA256c85016a9115aeb492bf116ab05791a9c3e6e30c39274767bd0476bd56a37db46
SHA51222758f6c6de591c99f8f9857c1b03e55c242f0a4987d376b08c30bc608027d1574a228a8230099ddac2a3214663396b016e85d085204155a5ec26f87a28496b4
-
Filesize
338B
MD5e833c5878fb4dc294ec836412b5b55aa
SHA1ae826a28633b5e40c68c2d25a88c08b2a1e7e661
SHA2567ebaba01a17b2cecfd403de666a8230367debc28a856e156ef9e45fba8d62d7e
SHA512f14f12607246dd57388d3b1ad61ff2e815d7539f5108a97f37fab303347e3d5e87d044e7fa73a0010804cb735f0261a0160ba87d4702db34152db57baa97eed3