Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2024 21:43
Behavioral task
behavioral1
Sample
161db86eb5f9237449a1027c1f63f310N.exe
Resource
win7-20240704-en
General
-
Target
161db86eb5f9237449a1027c1f63f310N.exe
-
Size
84KB
-
MD5
161db86eb5f9237449a1027c1f63f310
-
SHA1
db84b6c68774555ec724c737798e289818b25eaf
-
SHA256
9b3643ecbf7402006d8cf776811ae5190d1a70a8bd3ac491c7c20a8d97691efb
-
SHA512
cd369f9b767ce4513e0bb42e365ea7f7c34de683b61dcbda0c51ab0dd76964ecade34d25f1639bf65bbb12bd49ff032601f0cefd6be0318bd34712d739a7391e
-
SSDEEP
1536:Jz+jIHNv+vsFbwW6dk0QeLb4NMHriBRxiDkURF+:JznH976dUCnuniDI
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
161db86eb5f9237449a1027c1f63f310N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-113082768-653872390-2867000172-1000\Control Panel\International\Geo\Nation 161db86eb5f9237449a1027c1f63f310N.exe -
Executes dropped EXE 1 IoCs
Processes:
huter.exepid process 772 huter.exe -
Processes:
resource yara_rule behavioral2/memory/3632-0-0x0000000000400000-0x0000000000431000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\huter.exe upx behavioral2/memory/772-14-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral2/memory/3632-18-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral2/memory/772-21-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral2/memory/772-23-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral2/memory/772-29-0x0000000000400000-0x0000000000431000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
161db86eb5f9237449a1027c1f63f310N.exehuter.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 161db86eb5f9237449a1027c1f63f310N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
161db86eb5f9237449a1027c1f63f310N.exedescription pid process target process PID 3632 wrote to memory of 772 3632 161db86eb5f9237449a1027c1f63f310N.exe huter.exe PID 3632 wrote to memory of 772 3632 161db86eb5f9237449a1027c1f63f310N.exe huter.exe PID 3632 wrote to memory of 772 3632 161db86eb5f9237449a1027c1f63f310N.exe huter.exe PID 3632 wrote to memory of 1476 3632 161db86eb5f9237449a1027c1f63f310N.exe cmd.exe PID 3632 wrote to memory of 1476 3632 161db86eb5f9237449a1027c1f63f310N.exe cmd.exe PID 3632 wrote to memory of 1476 3632 161db86eb5f9237449a1027c1f63f310N.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\161db86eb5f9237449a1027c1f63f310N.exe"C:\Users\Admin\AppData\Local\Temp\161db86eb5f9237449a1027c1f63f310N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5a01dba4c45102fc15292fd5591166536
SHA1d96191c30e0f09439d8547f4ededbf6726ccd54b
SHA256cc2f9d3db04690b746c18d40c70f8dbc9ca18520b68619d9ccaeac500af98904
SHA512277a86f44c2648668205cd6c3c9f83feef147a5ad10839a130713eee9c931c26088d4dd95798b1d0e69f3439239abdee79d37656ad3963147a878a9433d60d32
-
Filesize
84KB
MD5c0d0014cbb2dab1f19018c9a684932cd
SHA1070a9bf13ffe41026a2e02b91c27535ffe09085f
SHA2566ad7cd2f528bc3f711d5b95ce5738b1af8263e7c24c0c630a5007da8f2430519
SHA512e5375192b24f647dbc195299b274aed2ad3efe49696dc315309b7331ab49f0c3ebb2c809d4848ecb6dee80322e52ef21e4fd20000471531e96a38631d35a7290
-
Filesize
276B
MD55334015acd267d9ce6e95138f9ed96b2
SHA15f0c2ba5938255d9fe446a438a61f37c361fa48d
SHA256e4d78041ef89777362e4ee0c9a0350529f3e3b497052f718c02258f486f6ecd9
SHA5123318c6ebb272b190d9745196da2fd29baf79fab2af3518cc7c980667d1197bade7ca0561330d3bd8dafd8bafe4895c1e878d97d8abadf9fefbc2c1267a6b74a8