Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
0964a0f9cc43efaa5d9e251343a5d5b839fc2254bcaf7b670b3bf03cf6333cd1.exe
Resource
win7-20240903-en
General
-
Target
0964a0f9cc43efaa5d9e251343a5d5b839fc2254bcaf7b670b3bf03cf6333cd1.exe
-
Size
333KB
-
MD5
d2f8aab08fd9c39a7744989ca6dc1463
-
SHA1
a49b9433124123b56518c7aa83f4dcc0a62e2fc5
-
SHA256
0964a0f9cc43efaa5d9e251343a5d5b839fc2254bcaf7b670b3bf03cf6333cd1
-
SHA512
9a96cfd32877c3d320dae2c732ec38949de331b63fb9e75cd95c52be1fab379a2e73cd0ab9e39595782a3d2e5c10a69f8c27c4c6d0959ec6f254d3c78caa9b1b
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY9:vHW138/iXWlK885rKlGSekcj66ciM
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 0964a0f9cc43efaa5d9e251343a5d5b839fc2254bcaf7b670b3bf03cf6333cd1.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation cugua.exe -
Executes dropped EXE 2 IoCs
pid Process 948 cugua.exe 3080 porii.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0964a0f9cc43efaa5d9e251343a5d5b839fc2254bcaf7b670b3bf03cf6333cd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cugua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language porii.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe 3080 porii.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 552 wrote to memory of 948 552 0964a0f9cc43efaa5d9e251343a5d5b839fc2254bcaf7b670b3bf03cf6333cd1.exe 82 PID 552 wrote to memory of 948 552 0964a0f9cc43efaa5d9e251343a5d5b839fc2254bcaf7b670b3bf03cf6333cd1.exe 82 PID 552 wrote to memory of 948 552 0964a0f9cc43efaa5d9e251343a5d5b839fc2254bcaf7b670b3bf03cf6333cd1.exe 82 PID 552 wrote to memory of 1172 552 0964a0f9cc43efaa5d9e251343a5d5b839fc2254bcaf7b670b3bf03cf6333cd1.exe 83 PID 552 wrote to memory of 1172 552 0964a0f9cc43efaa5d9e251343a5d5b839fc2254bcaf7b670b3bf03cf6333cd1.exe 83 PID 552 wrote to memory of 1172 552 0964a0f9cc43efaa5d9e251343a5d5b839fc2254bcaf7b670b3bf03cf6333cd1.exe 83 PID 948 wrote to memory of 3080 948 cugua.exe 94 PID 948 wrote to memory of 3080 948 cugua.exe 94 PID 948 wrote to memory of 3080 948 cugua.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0964a0f9cc43efaa5d9e251343a5d5b839fc2254bcaf7b670b3bf03cf6333cd1.exe"C:\Users\Admin\AppData\Local\Temp\0964a0f9cc43efaa5d9e251343a5d5b839fc2254bcaf7b670b3bf03cf6333cd1.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\cugua.exe"C:\Users\Admin\AppData\Local\Temp\cugua.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\porii.exe"C:\Users\Admin\AppData\Local\Temp\porii.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5fba13473aa08dd9f0a0832ffbdb6ef3e
SHA1591a234da92eb98dc431be1fbdeeeab01619c942
SHA256921a69c637af3bd926986b5920e91dc8f415edacb5b8ab504a738fdcb4d90af1
SHA512840c0c1fd3b1195c443c47040e2c3786d29a707b2bc15fad0bae8e7049dc3bc73e2382dee80be5e789db61399fecb0aa6654aab02829a3620507a32bc14efbd4
-
Filesize
333KB
MD5a5c24f0f1a9bf570a4f5f72086e0ee84
SHA16817dac8152c028ec34010b81f74f630c911ab45
SHA256c74cfd2df8f0212662432b0c1b02b6868a480d37822857ca5cc5af0b9ae6867f
SHA512809242a3dcf871b844da04125bad1350117bf8fdfe5b1dd989686442c7b3921ca8f3e0f5d7c4c16a0d486c6b100e5a1eecbbf3546bc857ac0b7c17284077e68f
-
Filesize
512B
MD533817f15e726073ebcb85c9ab118d565
SHA15e3fa8c00e3026a3adad0125b0056837f1bb2486
SHA256d2ebee2644f259f50c67c507c7a9bb86a571fc27743f653dfe914226bb9430e3
SHA51244e621d102cd05a74990d6d38f0977fc034ca7cdfc98dfa34f5c6abe1171ed9916d26d5dbfa72806530d1bfab649885f993fd3e484c2dc3cd2fde77716f0a54c
-
Filesize
172KB
MD566138e64f07d099bfacb093b8a4aab26
SHA156f0f8ce3e14252979030d2c2a3aa46e441b9c12
SHA2569341f4967476eac5876996579cbb787fb1cf059b6195199f330c4c3226c7617d
SHA512058a203c881c91358e036764bb91aed3ec3136b11f24863afc9e4f533c916b6d84167632fec28fc3c898e39743136ce0651c52235a6aebdadba1532b3c420c21