Analysis
-
max time kernel
120s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 16:57
Static task
static1
Behavioral task
behavioral1
Sample
ac10d066d14222656dad6bc235568a00N.exe
Resource
win7-20240704-en
General
-
Target
ac10d066d14222656dad6bc235568a00N.exe
-
Size
6.5MB
-
MD5
ac10d066d14222656dad6bc235568a00
-
SHA1
db165f408c0b22d6e71e948bb23a469aac2fe276
-
SHA256
803b529bcbc525a567dc870da31858520c17ba81e28a27aca5ca76b01d2cd592
-
SHA512
2746168048bebe0497f29d883c412872018f071cf169f8b7ae9c9605e9769f5638c3ff70fe0d1e326821ae2820e6a68389baaaab61b657db24735f4ad9c129b7
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSw:i0LrA2kHKQHNk3og9unipQyOaOw
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ryifdu.exeac10d066d14222656dad6bc235568a00N.exesyvep.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation ryifdu.exe Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation ac10d066d14222656dad6bc235568a00N.exe Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation syvep.exe -
Executes dropped EXE 3 IoCs
Processes:
syvep.exeryifdu.exeovtay.exepid process 916 syvep.exe 1420 ryifdu.exe 528 ovtay.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\ovtay.exe upx behavioral2/memory/528-69-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/528-74-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ryifdu.exeovtay.execmd.exeac10d066d14222656dad6bc235568a00N.exesyvep.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ryifdu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ovtay.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac10d066d14222656dad6bc235568a00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syvep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
ac10d066d14222656dad6bc235568a00N.exesyvep.exeryifdu.exeovtay.exepid process 3384 ac10d066d14222656dad6bc235568a00N.exe 3384 ac10d066d14222656dad6bc235568a00N.exe 916 syvep.exe 916 syvep.exe 1420 ryifdu.exe 1420 ryifdu.exe 528 ovtay.exe 528 ovtay.exe 528 ovtay.exe 528 ovtay.exe 528 ovtay.exe 528 ovtay.exe 528 ovtay.exe 528 ovtay.exe 528 ovtay.exe 528 ovtay.exe 528 ovtay.exe 528 ovtay.exe 528 ovtay.exe 528 ovtay.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ac10d066d14222656dad6bc235568a00N.exesyvep.exeryifdu.exedescription pid process target process PID 3384 wrote to memory of 916 3384 ac10d066d14222656dad6bc235568a00N.exe syvep.exe PID 3384 wrote to memory of 916 3384 ac10d066d14222656dad6bc235568a00N.exe syvep.exe PID 3384 wrote to memory of 916 3384 ac10d066d14222656dad6bc235568a00N.exe syvep.exe PID 3384 wrote to memory of 1036 3384 ac10d066d14222656dad6bc235568a00N.exe cmd.exe PID 3384 wrote to memory of 1036 3384 ac10d066d14222656dad6bc235568a00N.exe cmd.exe PID 3384 wrote to memory of 1036 3384 ac10d066d14222656dad6bc235568a00N.exe cmd.exe PID 916 wrote to memory of 1420 916 syvep.exe ryifdu.exe PID 916 wrote to memory of 1420 916 syvep.exe ryifdu.exe PID 916 wrote to memory of 1420 916 syvep.exe ryifdu.exe PID 1420 wrote to memory of 528 1420 ryifdu.exe ovtay.exe PID 1420 wrote to memory of 528 1420 ryifdu.exe ovtay.exe PID 1420 wrote to memory of 528 1420 ryifdu.exe ovtay.exe PID 1420 wrote to memory of 3640 1420 ryifdu.exe cmd.exe PID 1420 wrote to memory of 3640 1420 ryifdu.exe cmd.exe PID 1420 wrote to memory of 3640 1420 ryifdu.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac10d066d14222656dad6bc235568a00N.exe"C:\Users\Admin\AppData\Local\Temp\ac10d066d14222656dad6bc235568a00N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\syvep.exe"C:\Users\Admin\AppData\Local\Temp\syvep.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\ryifdu.exe"C:\Users\Admin\AppData\Local\Temp\ryifdu.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\ovtay.exe"C:\Users\Admin\AppData\Local\Temp\ovtay.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:3640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD5e9573e14b646336380998a9ee3c2afe9
SHA11e0e3e650ff1ad9ffecda30ecdfa716599fecf38
SHA25676e6277308668e23a463fed9a3b68c7d5e6efbf951bba5bcb93796298e71d2a8
SHA51279acef9a33699476a09f4437ce4976be6ffa19aecfc757ffb31c167edef475194b71ac1956ea27fe12729f121546f98e95055a19cbbb60257162dcdd15a297ba
-
Filesize
224B
MD5fac134bcc3206613e8b8f76fc9bc8db8
SHA1229251faf996f2012febe84c371623dd10f053d4
SHA256166027b109633e0c408dc22bb38f7fcd8e41c110d8e872e5b89b0fcc7967ae19
SHA512dd8d45c1ff4bd1939533df0facefb30188e385bfefbc8c8329cb89490d328b1086a5455649db8b9af23464229dbb6eb82f3e59fabb80f60c96415dd0b9f8650d
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5c1adaa29fac1611dd5b81d6fe4c4cfb6
SHA12660319c47f4d1269e05da103c4b99db5fa1031e
SHA256acb28eece200c34abe879b28b36ec90476f6680de7c2892439e2fcd8c5a622cf
SHA5128e35fa74213a14f75fb3f588e6e49515ab2db1538d816fd4db087e005151c3623340e94f62e5fc99cdcf9edf6c5af84ce23335ed88024b711dcb506def5c5384
-
Filesize
459KB
MD5a348e4ced2b3a303c97ad8b92545fc59
SHA14960db6b81f360cb7452cb03ba95c0c98bcd954a
SHA2565f6e3b6dd099391c2c85e956231f5ff70bcd3597e1503c591489110f5201161d
SHA5128b5f3894e145d68c436c7b6171c44f541395459ab96e58a1ffd6d6e684681790a247f0afd0dcd58c105d3887fbce4ced320593f25739754fd48ab82b023870e7
-
Filesize
6.5MB
MD54a6ecff10c3f151d94ce2d7c14fe3298
SHA1d92006ffb9b2e8da08346475ffc88eb4ddaecd77
SHA256b2a61fc08d27e4f5d60a7b909727d36a4da4d7bab5b5c6e93daa568a5f5a5830
SHA5126e75543dbcdb5ff5f3c0c31729ac1a02a7782c51f78b651c040422e2f98689eea789c7fedca77e4ca7092bd1cee4d2a36b9132d4be7e458e9402a4429985d268