Analysis
-
max time kernel
120s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 08:19
Behavioral task
behavioral1
Sample
808c54e52e59237255aff6d34511a760N.exe
Resource
win7-20240708-en
General
-
Target
808c54e52e59237255aff6d34511a760N.exe
-
Size
558KB
-
MD5
808c54e52e59237255aff6d34511a760
-
SHA1
b3676f18e81917f753e202e483c0b9fb8533d2ec
-
SHA256
bd6338278e91a2f1c3ee4857c69899640d897a120ae9764759fc9ad2c8b9b78d
-
SHA512
da396174fb2ddeb2d6b04120cb5f34d09acb75a056a048a387f6e718ff98edf9f060567b219123aef4518a5baedf9d3e6fdc8a7afe8ffbeefb9d6f934e3749e0
-
SSDEEP
12288:zccNvdRExZGe+Q1nSoS++43x+l7QLiaEy9:znPfQp9L3olqF9
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 808c54e52e59237255aff6d34511a760N.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation qobuv.exe -
Executes dropped EXE 2 IoCs
pid Process 3232 qobuv.exe 1992 rusum.exe -
resource yara_rule behavioral2/memory/696-0-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/files/0x00090000000234be-6.dat upx behavioral2/memory/3232-11-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/696-14-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/3232-17-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/3232-26-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 808c54e52e59237255aff6d34511a760N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qobuv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rusum.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe 1992 rusum.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 696 wrote to memory of 3232 696 808c54e52e59237255aff6d34511a760N.exe 86 PID 696 wrote to memory of 3232 696 808c54e52e59237255aff6d34511a760N.exe 86 PID 696 wrote to memory of 3232 696 808c54e52e59237255aff6d34511a760N.exe 86 PID 696 wrote to memory of 216 696 808c54e52e59237255aff6d34511a760N.exe 87 PID 696 wrote to memory of 216 696 808c54e52e59237255aff6d34511a760N.exe 87 PID 696 wrote to memory of 216 696 808c54e52e59237255aff6d34511a760N.exe 87 PID 3232 wrote to memory of 1992 3232 qobuv.exe 93 PID 3232 wrote to memory of 1992 3232 qobuv.exe 93 PID 3232 wrote to memory of 1992 3232 qobuv.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\808c54e52e59237255aff6d34511a760N.exe"C:\Users\Admin\AppData\Local\Temp\808c54e52e59237255aff6d34511a760N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Local\Temp\qobuv.exe"C:\Users\Admin\AppData\Local\Temp\qobuv.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\rusum.exe"C:\Users\Admin\AppData\Local\Temp\rusum.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD5b04098617867c9bef45e960e20db46be
SHA160c9312e22d0d96a506eb0b5dde890bc7118f04a
SHA25699c9f776d3efb8b852b3c6648bbb53dc6e0b5d40d0fb81630d24f893cef57a81
SHA512342737c82e83b704a4319fc08b77eb4b91061e14da674a6ed16d46d8164841161bf40dd83820210dc10209ae0ce6d98e3712874f8af434e452c58d39bc19d9c1
-
Filesize
512B
MD51f8d7c4bfb95580df2e0c19daab9f99d
SHA1b277bd8580b404e19ac5888fae386627529d604a
SHA256a2b7ff16e62c2fce6e18215af485cb6061f98640b202d8635ef29249c505cea8
SHA512dd28543ba767459517f140c00b04a7d40c0d4c275c5a30a5b563e9e2db1c9c357c01567d3bb27f23026e4d386bef29507f4c322e5c9f5d0cb817147294d857a4
-
Filesize
558KB
MD5c245b3e9514fdbd11352c9b4dcb968de
SHA18798d2e78d43a3a4b79c57deef5d78e359edf7a8
SHA256d73aebb4cce9e4cc89affd6b531eaedb90a9cdbdc68379bbaba2992fd9bf320e
SHA5124c9a1cae5bc746a8bb70ccdb434de26be490b3c43a58bdcdd6e420a8a56ba0c077f26020e6da7a9ab5823f9f9d62721eba1039da6b6639ce578318b5ff3fb5a9
-
Filesize
194KB
MD5664fa9b8a801fdca79f78e5cb73a2f14
SHA1a8ae4e67a862d165d2ce3a55a00cae30773f1353
SHA25607129a2feba13cb8ec96be5eda062d4e509848d4219065d9e976298fc8dc79a8
SHA512967d2839dabada2b9cb2a4609bd30ca2f12421926532a669128b054c64d300338b3f726cc0bfc76b2c3b0a4817feaecea81b52e75d7e86591c3da683d390144b