Analysis
-
max time kernel
98s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
0d40c6ed3bb93766766f8e0e325acb20N.exe
Resource
win7-20240705-en
General
-
Target
0d40c6ed3bb93766766f8e0e325acb20N.exe
-
Size
56KB
-
MD5
0d40c6ed3bb93766766f8e0e325acb20
-
SHA1
e00a274d0ebe106424abeef8d72c29b2f86695e9
-
SHA256
0b1a8603ae89200d97744cfa54e666befe95a937c87d077fd98264bd45f9bd71
-
SHA512
487ebab1d6a439e4b13815bbeb949c860716566ec7989605c6fc532570305bbb9dfca434664a831a212aa8f25589e2153fcb21d400ddd934f1f17c1e36f5b696
-
SSDEEP
1536:vMcQYte55zs091Zw9FAGDdJYipvwGf9ogjrgHi:vMhAe5Zs091KI+JYixw49Xjrp
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0d40c6ed3bb93766766f8e0e325acb20N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation 0d40c6ed3bb93766766f8e0e325acb20N.exe -
Executes dropped EXE 1 IoCs
Processes:
biudfw.exepid process 2832 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0d40c6ed3bb93766766f8e0e325acb20N.exedescription pid process target process PID 3496 wrote to memory of 2832 3496 0d40c6ed3bb93766766f8e0e325acb20N.exe biudfw.exe PID 3496 wrote to memory of 2832 3496 0d40c6ed3bb93766766f8e0e325acb20N.exe biudfw.exe PID 3496 wrote to memory of 2832 3496 0d40c6ed3bb93766766f8e0e325acb20N.exe biudfw.exe PID 3496 wrote to memory of 4808 3496 0d40c6ed3bb93766766f8e0e325acb20N.exe cmd.exe PID 3496 wrote to memory of 4808 3496 0d40c6ed3bb93766766f8e0e325acb20N.exe cmd.exe PID 3496 wrote to memory of 4808 3496 0d40c6ed3bb93766766f8e0e325acb20N.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d40c6ed3bb93766766f8e0e325acb20N.exe"C:\Users\Admin\AppData\Local\Temp\0d40c6ed3bb93766766f8e0e325acb20N.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:2832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:4808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5ed6b369be3e1ce06675a64afb5b3ccff
SHA1243e8f42c33d030b37c2d4e2947a45f66ee08a27
SHA25681c205732de13de273eb7e1e16854ad008144dd715d263ba3f2c58b04a001b39
SHA512816597c54cea206d6a4e18b3e84b75c331bc694315833ad2457121ec2646a29cd0d9baff4eee0e7a81a9d9ee71be6aee32dfe916745f0aa084a75a4cc0c18e34
-
Filesize
512B
MD5b4a86880004da8726288d7ec954885a8
SHA11bab1cfbdc2c540246210bc7852f8fe7e8357b31
SHA256c85016a9115aeb492bf116ab05791a9c3e6e30c39274767bd0476bd56a37db46
SHA51222758f6c6de591c99f8f9857c1b03e55c242f0a4987d376b08c30bc608027d1574a228a8230099ddac2a3214663396b016e85d085204155a5ec26f87a28496b4
-
Filesize
276B
MD51862e68ee220fca16fb7cdb1a4b04683
SHA1125d071224d1d875b818f1dbc09c59d416aa9a75
SHA2564f3a3113913d3b0da973a9fe0d5dc33520375a6c6b7dc87eff19991f8f043b1e
SHA51290a0b0e6949dd8c41839d1f6cf355de7d9c53e2d385d19c8e5a39b4db8b1802688cd505968d151cc2224d0cf7bde9cef82bb963bb27b34baf631d1657cdc792b