Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
59c49c0b0b8c653cc95a856a558ae0a0N.exe
Resource
win7-20240708-en
General
-
Target
59c49c0b0b8c653cc95a856a558ae0a0N.exe
-
Size
53KB
-
MD5
59c49c0b0b8c653cc95a856a558ae0a0
-
SHA1
795e4ce91db3be9db49e562a7b62a11a711e208c
-
SHA256
f2ca2511b414dfdddd8aaf75a968acb77edcdcde4ec9cbbcd026de737ef173bd
-
SHA512
605194f36f6112f371df738e26dd512364ace472e8b5be4dc55a8a9adbefdcd963d7e60d6fce8769358704a5908145ac24938c6571f1930bd0e184229c75c91e
-
SSDEEP
1536:TlnBzGPEdPJpUI4QP4BDK3XmbPfKJ97ifw:JnBGPUMQwBDamb3a7iY
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
59c49c0b0b8c653cc95a856a558ae0a0N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3774859476-2260090144-3466365324-1000\Control Panel\International\Geo\Nation 59c49c0b0b8c653cc95a856a558ae0a0N.exe -
Executes dropped EXE 1 IoCs
Processes:
biudfw.exepid process 1608 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
59c49c0b0b8c653cc95a856a558ae0a0N.exebiudfw.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59c49c0b0b8c653cc95a856a558ae0a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biudfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
59c49c0b0b8c653cc95a856a558ae0a0N.exedescription pid process target process PID 324 wrote to memory of 1608 324 59c49c0b0b8c653cc95a856a558ae0a0N.exe biudfw.exe PID 324 wrote to memory of 1608 324 59c49c0b0b8c653cc95a856a558ae0a0N.exe biudfw.exe PID 324 wrote to memory of 1608 324 59c49c0b0b8c653cc95a856a558ae0a0N.exe biudfw.exe PID 324 wrote to memory of 592 324 59c49c0b0b8c653cc95a856a558ae0a0N.exe cmd.exe PID 324 wrote to memory of 592 324 59c49c0b0b8c653cc95a856a558ae0a0N.exe cmd.exe PID 324 wrote to memory of 592 324 59c49c0b0b8c653cc95a856a558ae0a0N.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59c49c0b0b8c653cc95a856a558ae0a0N.exe"C:\Users\Admin\AppData\Local\Temp\59c49c0b0b8c653cc95a856a558ae0a0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD59c58813d849e48fd457dcfcabd1fc194
SHA12cbc3df4b698d079971ad9cdb2793294fa2bc612
SHA2563ed5127626251554b318af06ebfe39345177fd7261a8182bfb35aae428dfb6cd
SHA51219553f8368bbb627cefbd75f80809bae7ed0028f866aba800a1248804f53de7c8ad5ecfc0bd6fc0cc6c4635aa41b9c9694ea59e1b13ae50ada28dad1dac610b9
-
Filesize
512B
MD5b4a86880004da8726288d7ec954885a8
SHA11bab1cfbdc2c540246210bc7852f8fe7e8357b31
SHA256c85016a9115aeb492bf116ab05791a9c3e6e30c39274767bd0476bd56a37db46
SHA51222758f6c6de591c99f8f9857c1b03e55c242f0a4987d376b08c30bc608027d1574a228a8230099ddac2a3214663396b016e85d085204155a5ec26f87a28496b4
-
Filesize
276B
MD5dc3b7247571d901221119c4a9a1e0b6e
SHA1ed0d64d767b68c42edf7cb7105465e4b4e6bd289
SHA2569ee625b0f3bc3f677e0fae141a42d8fb3db34bd4797f9f77d2d0e4b9cba3de35
SHA512052bc92cca76501b448962caae62833a49202d331e889b48696b185ac2dd3b1f4c72da7269574927e2cb41960b3f8f14ac1fba9112dcc98191990f8d0d7fb0f7