Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 02:02
Static task
static1
Behavioral task
behavioral1
Sample
b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exe
Resource
win7-20240708-en
General
-
Target
b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exe
-
Size
56KB
-
MD5
6bc6d3ef3a45c337462b692271b09cce
-
SHA1
17d474c1246cce14805e53ed25d9105aaa4bae20
-
SHA256
b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130
-
SHA512
a52fa030193233ea0a1c30d0432dd826ac8987df27abe0c3e9db9309d095723052c6d74711f09e776abb8d6a6002e4f60765aac1377eb3b622698f5b92be1cad
-
SSDEEP
1536:MQPzemdaNqAPG17k74qlmbbVgYyvxcd5jnGWqN7kS8lR:MOemdTd1o74qlmbbJ+x+IkfR
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exe -
Executes dropped EXE 1 IoCs
Processes:
biudfw.exepid process 2028 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exedescription pid process target process PID 1368 wrote to memory of 2028 1368 b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exe biudfw.exe PID 1368 wrote to memory of 2028 1368 b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exe biudfw.exe PID 1368 wrote to memory of 2028 1368 b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exe biudfw.exe PID 1368 wrote to memory of 5064 1368 b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exe cmd.exe PID 1368 wrote to memory of 5064 1368 b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exe cmd.exe PID 1368 wrote to memory of 5064 1368 b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exe"C:\Users\Admin\AppData\Local\Temp\b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:5064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD553bb932c2f1ad5b1d66a55128efd9bff
SHA14ddbef51105321e728a57d96089caa8627734987
SHA25619b00bfc76ddb51e9bb9ae06af7b514e3f7a23fbd0b9e13b0771a163179409e1
SHA51204fce5ad7315b1f3cc1a4cc69c5e84643fd72bb040b721159ac5db54947ad7d23fcae42cee56a06ae8d4e469c597338a27f171a45a7b4f66dcf692237ea5ea19
-
Filesize
512B
MD57cdc8777d33db85bc19aefb64879a7f7
SHA1f2d494d4dfe93a05eb58513935196e8578648adf
SHA2569af382db716e39144dda99d3d9afbd5df9b65e6a36af229e715c00539bce6336
SHA51234b075db80bf3704f76f9dd28eedffe88c9b3b5f730c79c27b9908fe2865847ae925487de2dcc1a8566bd3836d3b770ca3831d0b110312376684a92e42c6b48f
-
Filesize
338B
MD51b5f87a2c264bbacfbaff342e5ba5d25
SHA16c09d0ba1e0bc89626ee288b968f2175be68e1bb
SHA256780cce8830d586580fadaa90b9c97db0670c45befc47c2a7ba824c786d342850
SHA51225639c8f8b19d986fa0b941368af023da45613563f9886f82ca9423d95371198014e01ee2cbc4a73aa6b42c39631599b48f1a0680c352d2921485426098f9eb8