Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 04:38
Static task
static1
Behavioral task
behavioral1
Sample
c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe
Resource
win7-20240708-en
General
-
Target
c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe
-
Size
332KB
-
MD5
aece7a093e6b27c5f1474cd8422c9e66
-
SHA1
eeb0ba66278e98a2241a3cd19d317007575c6578
-
SHA256
c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139
-
SHA512
3e94f42fb41f5cb3384f8e23b75d1539c9cd2bd5aa2aff2d9a5c1cd5496b8cd2493f22c76da08b516aed689b62d025028d29c4f98c2487f80017e3c4b9b612aa
-
SSDEEP
6144:yty5fbpxDuMcHYwt1gxloqtaE5iWbUMqfn8EijRUNafrHBw/iq:ytCLD7+51gxeq3gOU9EEQrhMJ
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exevoimz.exexouwwo.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-195445723-368091294-1661186673-1000\Control Panel\International\Geo\Nation c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe Key value queried \REGISTRY\USER\S-1-5-21-195445723-368091294-1661186673-1000\Control Panel\International\Geo\Nation voimz.exe Key value queried \REGISTRY\USER\S-1-5-21-195445723-368091294-1661186673-1000\Control Panel\International\Geo\Nation xouwwo.exe -
Executes dropped EXE 3 IoCs
Processes:
voimz.exexouwwo.exekofea.exepid process 2188 voimz.exe 2816 xouwwo.exe 3968 kofea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exevoimz.execmd.exexouwwo.exekofea.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language voimz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xouwwo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kofea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
kofea.exepid process 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe 3968 kofea.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exevoimz.exexouwwo.exedescription pid process target process PID 3408 wrote to memory of 2188 3408 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe voimz.exe PID 3408 wrote to memory of 2188 3408 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe voimz.exe PID 3408 wrote to memory of 2188 3408 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe voimz.exe PID 3408 wrote to memory of 3944 3408 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe cmd.exe PID 3408 wrote to memory of 3944 3408 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe cmd.exe PID 3408 wrote to memory of 3944 3408 c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe cmd.exe PID 2188 wrote to memory of 2816 2188 voimz.exe xouwwo.exe PID 2188 wrote to memory of 2816 2188 voimz.exe xouwwo.exe PID 2188 wrote to memory of 2816 2188 voimz.exe xouwwo.exe PID 2816 wrote to memory of 3968 2816 xouwwo.exe kofea.exe PID 2816 wrote to memory of 3968 2816 xouwwo.exe kofea.exe PID 2816 wrote to memory of 3968 2816 xouwwo.exe kofea.exe PID 2816 wrote to memory of 2576 2816 xouwwo.exe cmd.exe PID 2816 wrote to memory of 2576 2816 xouwwo.exe cmd.exe PID 2816 wrote to memory of 2576 2816 xouwwo.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe"C:\Users\Admin\AppData\Local\Temp\c1d64b05f775a3311b57c5b5e74405cdf8010f3c7fdabc193553369e7fd15139.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\voimz.exe"C:\Users\Admin\AppData\Local\Temp\voimz.exe" hi2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\xouwwo.exe"C:\Users\Admin\AppData\Local\Temp\xouwwo.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\kofea.exe"C:\Users\Admin\AppData\Local\Temp\kofea.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5e3c07938cd77830b2a184a14c8d88008
SHA166de4e4665ae56fa8015c73f5be3703c763dae71
SHA2569e9d2ed9ea8bb286a1d10c62270c70181c5dcd452b432700dceed777c8b8ad02
SHA5128a001ab8b6d75e58bd80c0d1e357794f4c77e4959a47ed69d22273d17e6f7b100677cfb76d327cf10314016fe3784c529afcb57e54e205d455354ea8098539a1
-
Filesize
224B
MD576eb2aa4d2a6385921f790518b720f10
SHA176d06ce6774c0833e475a1ce97ba80a0b9ab2f5e
SHA2560a7ccbac853afb6e7ed0a44a39cfd103ef8af4cb3cd5547bd6b8dcbf2f8d3295
SHA5121cb59436657bcc72b037028317a2f8c639a651827b685943d6fa597ebd43136bf34cd82b705c87da133de75029508793a186e1f436f147afddd2cda62897532e
-
Filesize
512B
MD5cc1a5e8a57326e8d947988010b5d0550
SHA14961e852bfead364b73e2aea5918dded939dac08
SHA2561a19cb361d35d15462a02be5abad7a1839bf996b6c8a49417613b98f6dd07360
SHA512700a5ae7732b0485806423f6efa06a3e23d40140f61dcac149eb1114f603179f8952321dc8eedf21eb492e71a08396c6e693089a64dd4dbcd138b0d5a9c2c1e1
-
Filesize
223KB
MD5df042bb1cc8f91583f847470078dab69
SHA1755c9c60b2a7de7e45174836ebdb064b2144ef0e
SHA25660c9044ccb16b29def2ae2eabc94652bfa62eb3e57ffdf97555e5fd125765111
SHA512176b33d4226ee43533f46c81c34e5c4f576476a5ad87dda2773ae229c4eaa2db228367f5ecdce304a83c6da5345c1f3c9edf10f301cda58b84bdeb0e675b547d
-
Filesize
332KB
MD570b82f3103f49860468c07fd372450e9
SHA1b577e912c02344ac627359f959795ed0dd0dd75a
SHA25604f96d1d3040f8e3cda310ade83384b518aa1fe23088ac90da68fca28ae14836
SHA512003f7c0260935b0cd4f0cd7580830f6aef7517434817c878d985c78a4ad298c86cf105b77afec5eca8bf4a377a6a35d51a03e79c7f7be53c16db8cf31cec5178
-
Filesize
332KB
MD5f52a82dd49d3752f5c06ff06331d0096
SHA120225fb43f81f023f89af67c93ea9c62f0546c08
SHA2562aef1636838e5baaadda09dcfabe2da7a4d5a36f4d8421fc68ad9a34a946f3b1
SHA51287238536d5090cc54a1101b7ff7b9f5224f782e3ffd78fb1785fffb524297ced89563723776ae72882bb2a5976092e16a52d6a15da9f571be11d09bed6d8ecc8