Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 10:47
Static task
static1
Behavioral task
behavioral1
Sample
b8f788750bcdec10cdca7daa18c166f0N.exe
Resource
win7-20240704-en
General
-
Target
b8f788750bcdec10cdca7daa18c166f0N.exe
-
Size
324KB
-
MD5
b8f788750bcdec10cdca7daa18c166f0
-
SHA1
5ae561b0a5a5cdfa1aadb20f2355e718670c471c
-
SHA256
2b26868cdea1e236721c55cf842cce7d4a0aec370543c6a819dda8ccb8570d43
-
SHA512
7df0a5b99a15d111ef047eb455243d715cb3d987e1bf043ca7f4124cf2d4db558a2be7b5eecc27ee367b3b41d6942261bde9b80419de04d5b97d60a7a79f7d67
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYuA:vHW138/iXWlK885rKlGSekcj66ciU
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b8f788750bcdec10cdca7daa18c166f0N.exezirid.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation b8f788750bcdec10cdca7daa18c166f0N.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation zirid.exe -
Executes dropped EXE 2 IoCs
Processes:
zirid.exetuxyi.exepid process 2080 zirid.exe 1432 tuxyi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b8f788750bcdec10cdca7daa18c166f0N.exezirid.execmd.exetuxyi.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8f788750bcdec10cdca7daa18c166f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zirid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tuxyi.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
tuxyi.exepid process 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe 1432 tuxyi.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
b8f788750bcdec10cdca7daa18c166f0N.exezirid.exedescription pid process target process PID 2600 wrote to memory of 2080 2600 b8f788750bcdec10cdca7daa18c166f0N.exe zirid.exe PID 2600 wrote to memory of 2080 2600 b8f788750bcdec10cdca7daa18c166f0N.exe zirid.exe PID 2600 wrote to memory of 2080 2600 b8f788750bcdec10cdca7daa18c166f0N.exe zirid.exe PID 2600 wrote to memory of 1040 2600 b8f788750bcdec10cdca7daa18c166f0N.exe cmd.exe PID 2600 wrote to memory of 1040 2600 b8f788750bcdec10cdca7daa18c166f0N.exe cmd.exe PID 2600 wrote to memory of 1040 2600 b8f788750bcdec10cdca7daa18c166f0N.exe cmd.exe PID 2080 wrote to memory of 1432 2080 zirid.exe tuxyi.exe PID 2080 wrote to memory of 1432 2080 zirid.exe tuxyi.exe PID 2080 wrote to memory of 1432 2080 zirid.exe tuxyi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8f788750bcdec10cdca7daa18c166f0N.exe"C:\Users\Admin\AppData\Local\Temp\b8f788750bcdec10cdca7daa18c166f0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\zirid.exe"C:\Users\Admin\AppData\Local\Temp\zirid.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\tuxyi.exe"C:\Users\Admin\AppData\Local\Temp\tuxyi.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD54bdf2c8288ae06e45710056749f1d337
SHA13b88947abd5b1fca78c668f647393a26f0307073
SHA25611e92f37d446d4b84dc610d076e96f67471fa566245d5c0299084a8086b68e2a
SHA51283f8aa91fabc6d745ae8d5efc621da8e951cf3cb5f7b1727ecdc72bcdd5b6d78d2f7c81495befaaaa6a3ecc416b4df6a0c0bcc98cbe5fee86155c51a6a082999
-
Filesize
512B
MD59c3160dd18e8b83e8caefddffbb79ed5
SHA127e623dbeeab71b4b9fb41776ed1801f3528001a
SHA256f6b87362a92883d13ac8990c11938277aa09d34a77ac720d85ba589701bc7506
SHA51225608d13adf73633ea40f0c1ad13bb99fca75428d19aa47aab45b1105922496995c104b9dce54e53580e980a430f5371c0b0322b36902ddaa1d654730330cbfc
-
Filesize
172KB
MD5fff2c0bbc1e5a1b7d3642abfced2e894
SHA163604a55e724783334cc21c33d3969aa9c8e58b5
SHA256f997cb76fa67b167a41e42d8bf41202c563115a6cde2e21a5dedc7d92ecfc033
SHA512c19cddf237014f0b4f31565fe2cf9b04e1218e279c9f83c5ab3a10da05f2d3c9ab7fab7250c68235d01f9707c2ec14ee5def6385d7a2a9045a5663ae4c0ec33b
-
Filesize
324KB
MD588d17865cd64642743993691b0981d96
SHA129adb5d43a8ccbdb13923b1b4995a8b472068f15
SHA2563ff0de3e93d44c856db03571c07956e28a98b566c6b0b6d25b2ceb718726fd8a
SHA512b5d3069e5a6eee3f3605fda26e7306337de2a7ddd2681acef0453560e2c5a5c77c8f51c72a1c34c450f2339ac3c31ede2c335eab952e0102bf91876d5d4d7124