Analysis
-
max time kernel
95s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 18:20
Static task
static1
Behavioral task
behavioral1
Sample
052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exe
Resource
win7-20240704-en
General
-
Target
052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exe
-
Size
94KB
-
MD5
268c77328410842c8f27c185cf8d3457
-
SHA1
0091b0533ce4ac188124afd536c7ef5e8f87037f
-
SHA256
052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0
-
SHA512
03905e0668021d51a2fdea5501a74853cf1161057e41050b9000b8ce3dd856f9d4a36226eb78e6bd859b174d74d487d7e8fe35c22b168a0f4e15791727aeea23
-
SSDEEP
1536:VZYFIYC4qWCbHh5HeEHAOCKhlBvm1J4WMF4Zb:VZzK1CDeSCUeE4Zb
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.207
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exe -
Executes dropped EXE 1 IoCs
Processes:
dofhir.exepid process 1004 dofhir.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exedescription pid process target process PID 3296 wrote to memory of 1004 3296 052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exe dofhir.exe PID 3296 wrote to memory of 1004 3296 052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exe dofhir.exe PID 3296 wrote to memory of 1004 3296 052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exe dofhir.exe PID 3296 wrote to memory of 1728 3296 052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exe cmd.exe PID 3296 wrote to memory of 1728 3296 052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exe cmd.exe PID 3296 wrote to memory of 1728 3296 052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exe"C:\Users\Admin\AppData\Local\Temp\052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\dofhir.exe"C:\Users\Admin\AppData\Local\Temp\dofhir.exe"2⤵
- Executes dropped EXE
PID:1004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5c465e08fac955ff2af81ace188ab2219
SHA1bcf6f388647998a58bc5a15e3305477abf52e142
SHA2567bb1ef384df5ed68906a51b123e467974ded358892ea95514b49df8fa6cefb49
SHA512d0c8d517cec6b3738880f516d78eab1d700d93e329b6ed8f092999674ad5b9944740ea7a1bc2a5c155c140f298f29949b70f67870ad7d1f8303b860737fe11d8
-
Filesize
512B
MD54adffbc578ceaad93e361c4c2700b4e2
SHA13078a1c96cf37ee1bde1a548cec44c27f7a8720e
SHA256d0270cf0cebe5fc51dc8d55ffc5d23fcbb682d1822458bcb3d823101ba0a2045
SHA512812400e5e01e5fbaf7917f3d48a40f6d0c6f60bf2602f2827c2d9089022ebf174d04d79bf27bfb67638c78d0b3a86b26e7d4546243491ebb7955f456b9fd9245
-
Filesize
338B
MD517523d4d924c0507904a1bad6b50ac89
SHA1fa660cf86ac8b0145b23e17fc2a2ea5cd4c5f3c7
SHA256bde18d42f19947d0ddb9dc8133076b58a77d897ff9a1d12a2bcfe24ccc2fe56f
SHA51209b5b9eb3cd01cc99153bd99269f1926822dab4331768e8b1c8b07be5fcd12c1e43e40debad208abac1bd13b9aa5e0b0e67207e0841cdfe33ba4a88746ba5064