Analysis
-
max time kernel
119s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
1e0254ad94a994d0f23bbd58b177f38538fc133ac7b006c3100aa78d19652754N.exe
Resource
win7-20240903-en
General
-
Target
1e0254ad94a994d0f23bbd58b177f38538fc133ac7b006c3100aa78d19652754N.exe
-
Size
331KB
-
MD5
cf5c08b25c21683a077d908a07246850
-
SHA1
1c6120dd70615b1d09a7711e4c825f4a62cf37e8
-
SHA256
1e0254ad94a994d0f23bbd58b177f38538fc133ac7b006c3100aa78d19652754
-
SHA512
39302ceef2b6904e5abd456722658ad6844de5f6e799d1e0936ceb9252878a3ac22ad3b77d1c2ce4ab572c2d3bc64c27af7cf08356aececded13956a6c33c7e3
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYx:vHW138/iXWlK885rKlGSekcj66ciU
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation sowyk.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 1e0254ad94a994d0f23bbd58b177f38538fc133ac7b006c3100aa78d19652754N.exe -
Executes dropped EXE 2 IoCs
pid Process 936 sowyk.exe 4864 sitaa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e0254ad94a994d0f23bbd58b177f38538fc133ac7b006c3100aa78d19652754N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sowyk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sitaa.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe 4864 sitaa.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4076 wrote to memory of 936 4076 1e0254ad94a994d0f23bbd58b177f38538fc133ac7b006c3100aa78d19652754N.exe 84 PID 4076 wrote to memory of 936 4076 1e0254ad94a994d0f23bbd58b177f38538fc133ac7b006c3100aa78d19652754N.exe 84 PID 4076 wrote to memory of 936 4076 1e0254ad94a994d0f23bbd58b177f38538fc133ac7b006c3100aa78d19652754N.exe 84 PID 4076 wrote to memory of 3152 4076 1e0254ad94a994d0f23bbd58b177f38538fc133ac7b006c3100aa78d19652754N.exe 85 PID 4076 wrote to memory of 3152 4076 1e0254ad94a994d0f23bbd58b177f38538fc133ac7b006c3100aa78d19652754N.exe 85 PID 4076 wrote to memory of 3152 4076 1e0254ad94a994d0f23bbd58b177f38538fc133ac7b006c3100aa78d19652754N.exe 85 PID 936 wrote to memory of 4864 936 sowyk.exe 96 PID 936 wrote to memory of 4864 936 sowyk.exe 96 PID 936 wrote to memory of 4864 936 sowyk.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e0254ad94a994d0f23bbd58b177f38538fc133ac7b006c3100aa78d19652754N.exe"C:\Users\Admin\AppData\Local\Temp\1e0254ad94a994d0f23bbd58b177f38538fc133ac7b006c3100aa78d19652754N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\sowyk.exe"C:\Users\Admin\AppData\Local\Temp\sowyk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\sitaa.exe"C:\Users\Admin\AppData\Local\Temp\sitaa.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5e118461ab2ea0954890f9b1c12e2699a
SHA1cc9a9d8f8e4484e2d7e3ee2b9cb6ca5960e38ca6
SHA25608958cc88cc58b42d9fb0e8b477b1c781b0e656da45ba973ee2547ec79a776e5
SHA512f71fff2915bcedeaf5afa05eb8204e1386280e1b082a5016c947a91bda0d92bac56d4f312b383644c99722b7f2b2f07447bd04d9b0670591ef3608103e6955a9
-
Filesize
512B
MD53fd1bf4736d2abeda4d6db3abaf253e2
SHA1d164b472974895e8ff7f74b4cf8ab13131a7cd6b
SHA2567eded07326366566c960319f92dd5153ecbc921c750bb45b4c945173bf3e6ff1
SHA51243a9534d6d30014a1ad30c75dea3f9c3ee843ccd3d975fdab6af9da9d25865c3bb6415856ca1f7254d93d6cf4041945daf32495a0995a21d1d78739acae2070b
-
Filesize
172KB
MD515bf147db4b859a9b63195b6d228c4ca
SHA1781856cb9a659d8e0bd482b7575c9ca924dd4f83
SHA25664d51b23d6e3e6a02f850a66f9fccc245a4054b9e665d2a7f190e157ed9f338a
SHA5124588cf6559193760c0b70ef44c6a7113e3b6df02a3880094a44ceb03d72aa18b6e1f61ba41a846cbbd4afeb23f937041384d939656e2cf7bf2ed4529b28bee73
-
Filesize
331KB
MD5243fe037b6a03b810c4e6b29a9230f88
SHA12476e0dc87d9063f2b55d3dae5788701ddbd85ef
SHA2566255ab7e0e978a2a3b2be1d866789df1d510d12976741535fb77e74069575ce5
SHA512764942c006e21f2a673a50855d09fe98774dde4be85bb09744afb68bd2d14ea7fc6358070cd576692bcc5c61872f9eae33d95917a46adf8e45437dfd94b3390f