Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
a1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106.exe
Resource
win7-20240704-en
General
-
Target
a1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106.exe
-
Size
324KB
-
MD5
7b2d755611b8854aaa6e9456f5eb0185
-
SHA1
1c4cf067c3663d72a4cda2a4d747f069c9550613
-
SHA256
a1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106
-
SHA512
1578a794705e829592bab54efc6017a6bce6621c52fc16a4ad2a763efa0987961e5e2210d3181a96b543b74c71d335d24861e82c7c33f6f7f82b422dab380d1e
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYC:vHW138/iXWlK885rKlGSekcj66ciH
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106.exefukih.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation a1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation fukih.exe -
Executes dropped EXE 2 IoCs
Processes:
fukih.exebofoo.exepid process 1204 fukih.exe 4792 bofoo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exebofoo.exea1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106.exefukih.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bofoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fukih.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bofoo.exepid process 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe 4792 bofoo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106.exefukih.exedescription pid process target process PID 5080 wrote to memory of 1204 5080 a1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106.exe fukih.exe PID 5080 wrote to memory of 1204 5080 a1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106.exe fukih.exe PID 5080 wrote to memory of 1204 5080 a1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106.exe fukih.exe PID 5080 wrote to memory of 3108 5080 a1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106.exe cmd.exe PID 5080 wrote to memory of 3108 5080 a1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106.exe cmd.exe PID 5080 wrote to memory of 3108 5080 a1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106.exe cmd.exe PID 1204 wrote to memory of 4792 1204 fukih.exe bofoo.exe PID 1204 wrote to memory of 4792 1204 fukih.exe bofoo.exe PID 1204 wrote to memory of 4792 1204 fukih.exe bofoo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106.exe"C:\Users\Admin\AppData\Local\Temp\a1d1c96ddc5f56c07cee63e979b738e3dcf70fcedfbeec06831caea904aa1106.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\fukih.exe"C:\Users\Admin\AppData\Local\Temp\fukih.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\bofoo.exe"C:\Users\Admin\AppData\Local\Temp\bofoo.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD51f61024c28bfec2176a5110eef460b28
SHA1088da046d0623c4bd348396430d4336b3c951dcc
SHA25625d2cb9feb7fff589cc68f3c448685382cd0cbc26cfb2d393f2de2898491e090
SHA512654f82a87c06dea960ea63c96e9ead1829dc3d1a70869e266003e6611a12e0bccbc8a22ae4e0917d0bcff2ea2dc7828ac7156d6e73d2eb98183ccfb5b2f4dac4
-
Filesize
172KB
MD55ff109e93f759121ad8545e7f52c6b80
SHA14ed84831b975e33bb8dac492e21563050ab93657
SHA256130204cb3e09d7e65c644669ac83ed89c0d1e188dd54807e51acdefb96f1a1e5
SHA512154a4bae387eff351a7a8d48d099fe075a702035112951c522f72b3a7795fa9d4fcbed52aa14ac17ea192b4ee6c199c6d1254e8345a79b6ae1c105568658cd43
-
Filesize
324KB
MD5bfb35bc44b29b862d0b98ea9c6a9d714
SHA1db71b4caa531ebb1fece651a2bb1b4a10d0d7ce2
SHA256de2f32e0a23c4463c1f519d5029d32ec9b4af1ff5516d8edc8d7de93a5a7e2ce
SHA5126daa1bdb9f778cf66d594388e37713aa45c445e6a60a79c1c7cd7997a737ec86e3c40d0fbb48ace51d1151d2c9f98b17715a31a83454d1d5d8a3f2bcc77af4dc
-
Filesize
512B
MD59cf83ea5978540e0bf66e60148f9fa12
SHA18529c884585f8d7e5a3a8a65c9155596a337067f
SHA256d4cb4a95ddebaa5ac151237c4fcaa74dc16c6726763e7a922ef2368487f72cb7
SHA5129410553b155a7bc1cc69cbcca76b7e2522dc6f2397c93bf0b72a188602864436974777848814949c5bc34a788d104f3c1c262df44d18cd4fc025bf8ed3e90a0a