Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
a2a6e08967146e01690ba2c66c2004e0N.exe
Resource
win7-20240704-en
General
-
Target
a2a6e08967146e01690ba2c66c2004e0N.exe
-
Size
70KB
-
MD5
a2a6e08967146e01690ba2c66c2004e0
-
SHA1
225865c001791e456d939c41597be5ee84bf9d2a
-
SHA256
55b922a0eec15aef2c82d46686ad300ccac2452c891011c791c7c795a113ba2e
-
SHA512
2f4191724a903f578d3aa489ac761369715f3f973e64e893d647da470dcecbbf43c41e86146cc2d1a75fbbbfd2cdcc9620b4c23ff31330a931c458846065d888
-
SSDEEP
1536:v6fqsAPQYGmPzmZDDZrV8sMQXGkfn33n7z5WeIuhCarawk:yLAYUzmdD0sMQl7d7IuhCaeN
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation a2a6e08967146e01690ba2c66c2004e0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2972 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2a6e08967146e01690ba2c66c2004e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biudfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2972 2624 a2a6e08967146e01690ba2c66c2004e0N.exe 90 PID 2624 wrote to memory of 2972 2624 a2a6e08967146e01690ba2c66c2004e0N.exe 90 PID 2624 wrote to memory of 2972 2624 a2a6e08967146e01690ba2c66c2004e0N.exe 90 PID 2624 wrote to memory of 4516 2624 a2a6e08967146e01690ba2c66c2004e0N.exe 91 PID 2624 wrote to memory of 4516 2624 a2a6e08967146e01690ba2c66c2004e0N.exe 91 PID 2624 wrote to memory of 4516 2624 a2a6e08967146e01690ba2c66c2004e0N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2a6e08967146e01690ba2c66c2004e0N.exe"C:\Users\Admin\AppData\Local\Temp\a2a6e08967146e01690ba2c66c2004e0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD51a6f84ecc751f3506ec015b1b8921306
SHA1b8d1b0a72e2648bb4220f8935d4bfb9af027f819
SHA256ebe431cda40af638ddc0a0b04ff27a17b82f2a0fa05bce4136eae2f38a792bbc
SHA512cc279d513ad1808aa731cdb617cf55b5b51251f8ad9ce3419f0b31f4aad5f6b286a81558872fa69d2f269e207ba8eafcede8f5794db902ba95995ba0ac8d82e4
-
Filesize
512B
MD51c9b2720af0ca9528b47898d9c7f4799
SHA180495f16e333f54ecc700252323c2a7cb7d751e1
SHA256d1ea9a17b5a635a121e82e7963d3b134f74050da9debcd40c9622f50c5d38fe5
SHA5125afe876f2cd887458656b1747bce08d03f26ef286bcc83efa93e0111be856d0564bee4d6ef5637c167626bac121f7371b69c7952502d47784ac9ad568bf53eac
-
Filesize
276B
MD5c8e04c8b6915af65f0fc089ba31658b2
SHA144975f7062e53f4de8acd0908cc85b4ceb082dd9
SHA25674785541b47fca7aba87c9c6a136ba90dd052f2d67aec20f4bc8f18ce07efb3b
SHA512f2c3a66190c19b2b28cbabc43eb702e855a0da1b3774708dc475e04a5992b87718e7d20fcc489bf574f84d0c25f230bd541ed7794aba278edf8b46e2515fb9ad