Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
5031e4ef6885462edad8ba822d19a49992315d039d2ed2fd708e008c994de917N.exe
Resource
win7-20240903-en
General
-
Target
5031e4ef6885462edad8ba822d19a49992315d039d2ed2fd708e008c994de917N.exe
-
Size
70KB
-
MD5
71b00a8b6535d57246ba6acc484aa270
-
SHA1
e930668c521c945da540b145657eb269bff0bb72
-
SHA256
5031e4ef6885462edad8ba822d19a49992315d039d2ed2fd708e008c994de917
-
SHA512
5f2b64eae7715814e51d851c7308dd7984ff21c71b6beedb16532d682d46360bff9c6802562fadeac948fee3839391f3489c1fda070db7393a1f1b71f13773af
-
SSDEEP
1536:v6fqsAPQYGmPzmZDDZrV8sMQXGkfn33n7z5WeIuhCarawC:yLAYUzmdD0sMQl7d7IuhCaej
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Deletes itself 1 IoCs
pid Process 2756 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 biudfw.exe -
Loads dropped DLL 1 IoCs
pid Process 1992 5031e4ef6885462edad8ba822d19a49992315d039d2ed2fd708e008c994de917N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biudfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5031e4ef6885462edad8ba822d19a49992315d039d2ed2fd708e008c994de917N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2744 1992 5031e4ef6885462edad8ba822d19a49992315d039d2ed2fd708e008c994de917N.exe 30 PID 1992 wrote to memory of 2744 1992 5031e4ef6885462edad8ba822d19a49992315d039d2ed2fd708e008c994de917N.exe 30 PID 1992 wrote to memory of 2744 1992 5031e4ef6885462edad8ba822d19a49992315d039d2ed2fd708e008c994de917N.exe 30 PID 1992 wrote to memory of 2744 1992 5031e4ef6885462edad8ba822d19a49992315d039d2ed2fd708e008c994de917N.exe 30 PID 1992 wrote to memory of 2756 1992 5031e4ef6885462edad8ba822d19a49992315d039d2ed2fd708e008c994de917N.exe 31 PID 1992 wrote to memory of 2756 1992 5031e4ef6885462edad8ba822d19a49992315d039d2ed2fd708e008c994de917N.exe 31 PID 1992 wrote to memory of 2756 1992 5031e4ef6885462edad8ba822d19a49992315d039d2ed2fd708e008c994de917N.exe 31 PID 1992 wrote to memory of 2756 1992 5031e4ef6885462edad8ba822d19a49992315d039d2ed2fd708e008c994de917N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5031e4ef6885462edad8ba822d19a49992315d039d2ed2fd708e008c994de917N.exe"C:\Users\Admin\AppData\Local\Temp\5031e4ef6885462edad8ba822d19a49992315d039d2ed2fd708e008c994de917N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD51c9b2720af0ca9528b47898d9c7f4799
SHA180495f16e333f54ecc700252323c2a7cb7d751e1
SHA256d1ea9a17b5a635a121e82e7963d3b134f74050da9debcd40c9622f50c5d38fe5
SHA5125afe876f2cd887458656b1747bce08d03f26ef286bcc83efa93e0111be856d0564bee4d6ef5637c167626bac121f7371b69c7952502d47784ac9ad568bf53eac
-
Filesize
340B
MD5e0b9ddc305177c904d5d76af684b0751
SHA1082235f9eeb7eee4a4f10727d7c067a5fd78f673
SHA256a5f8aa8b33dae7dd114a7dd285cf988ef0f1147e87a28118f28a40cb07188e4b
SHA51275dbc9b05a7a84a9252f36be20fb5ee693e66bb4a519e43233dbffb5b252d204fd1d1e4c642c03adf2e343b4bfaee4610e32b512633ce4abf7319a2e0cc33e3e
-
Filesize
70KB
MD5e362d09ba2d1a23a85474c7a0ff0bc0e
SHA19f6138cb8481c5ba99657deeb1c46385750004c4
SHA2566ce286006ca8179d2b6270c6b5c5dd421b452f61fada186dcc7876f8dd0af73f
SHA51236fd82c971ba3d8567a4672d68390896dbe437c9e16f198c543ec6fb2f210572f4a18d9c3b6185b0fede1f6836ce7020705d2c96aef7b3f17d8ed42446f5cb0b