Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2024 22:35
Behavioral task
behavioral1
Sample
67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616.exe
Resource
win7-20240729-en
General
-
Target
67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616.exe
-
Size
402KB
-
MD5
795df109157cb3019f46be982a65d77d
-
SHA1
78a49ed0afcf9ce48f164ca6f47f0d79b76aa1f1
-
SHA256
67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616
-
SHA512
5e0fa3f69d9ef541071d2ed3adfb9ff2117a5bdf4a970409f2b97db4a1a5152b5ddb3e69f274bb30635eff341c16004c699ef576ec76cb681427ff44c297eb7c
-
SSDEEP
6144:85SXvBoDWoyLYyzbkPC4DYM6SB6v+qLnAzYmhwrxcvkzmSBroh3:8IfBoDWoyFblU6hAJQnON
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616.exexudof.exeosbaka.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation xudof.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation osbaka.exe -
Executes dropped EXE 3 IoCs
Processes:
xudof.exeosbaka.exesabiq.exepid Process 4196 xudof.exe 1368 osbaka.exe 1052 sabiq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeosbaka.exesabiq.execmd.exe67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616.exexudof.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osbaka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sabiq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xudof.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
sabiq.exepid Process 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe 1052 sabiq.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616.exexudof.exeosbaka.exedescription pid Process procid_target PID 2804 wrote to memory of 4196 2804 67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616.exe 86 PID 2804 wrote to memory of 4196 2804 67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616.exe 86 PID 2804 wrote to memory of 4196 2804 67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616.exe 86 PID 2804 wrote to memory of 2252 2804 67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616.exe 87 PID 2804 wrote to memory of 2252 2804 67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616.exe 87 PID 2804 wrote to memory of 2252 2804 67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616.exe 87 PID 4196 wrote to memory of 1368 4196 xudof.exe 89 PID 4196 wrote to memory of 1368 4196 xudof.exe 89 PID 4196 wrote to memory of 1368 4196 xudof.exe 89 PID 1368 wrote to memory of 1052 1368 osbaka.exe 102 PID 1368 wrote to memory of 1052 1368 osbaka.exe 102 PID 1368 wrote to memory of 1052 1368 osbaka.exe 102 PID 1368 wrote to memory of 1328 1368 osbaka.exe 103 PID 1368 wrote to memory of 1328 1368 osbaka.exe 103 PID 1368 wrote to memory of 1328 1368 osbaka.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616.exe"C:\Users\Admin\AppData\Local\Temp\67fbca0d1e899ec4b1148996488b1664b50601e4e452e98b41aa27a4e93a0616.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\xudof.exe"C:\Users\Admin\AppData\Local\Temp\xudof.exe" hi2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\osbaka.exe"C:\Users\Admin\AppData\Local\Temp\osbaka.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\sabiq.exe"C:\Users\Admin\AppData\Local\Temp\sabiq.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1328
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD55a57678f44cd7e37b4617ba00bb0241b
SHA108b21f1de2e67816ebe8a2bd040190750d9d32a3
SHA2566afe1873026bd63633ba712afee1892aa0af42a43e9320f11f537baa434b5970
SHA51273c7a8446752da86a2e37c42754439a319e351051b387a0f99fd2b8c92a0c4d99f25eaa9ce7b3640e12712c0ff8f3d5bc78278abe3f075c70616c4ea838d2a74
-
Filesize
224B
MD5716456d1c0c13dd5532107a0ee52756a
SHA1df21218efdc67f4f3039805867b4b5c9d014a7bb
SHA256814b40a15eb5f1d7dc243da47b62b228026a254726c0a6b3df0cf0c39f923fbd
SHA512769d159b1f6c2a24f05048604b9c16e7acf9aabcdc40eddce9f364126d6e9412008e9af35cde447c56e3f606d53f33a1188d7d92d13c44c3698fc3ee74810bfe
-
Filesize
512B
MD5a19cfc1fc41431858fb79b15388040b9
SHA170293bbc37050b529abc126e2291ddf7038025f7
SHA256b9109176de498ecb6e30dec01dcf168826b4c691a9ae406f2c9a343a9feaa8d5
SHA5129fd11430353c85dda5c0290971494797aac033845d7ef8b04f216da833f900dafefd4fdae63f23fa46fbe00b7fdb7ca70393e00949efccc4422d2fe993fe708f
-
Filesize
402KB
MD5d0a90267fb729b1c60549aab7b888663
SHA1a18e33bb2d9fa4890070a08a4cf7bdd8d8834b95
SHA256a855be54cd157832ca563d684b1c02729e68669c341c9719d311066fe758861a
SHA51249a5255af72123fa9b14f7fbfda6f4cb0ecbfdddc27032fc417ba1ad251473d796e278358873a40bb39072d47f1b96b308b1032af35e55b3d9f600987d235354
-
Filesize
223KB
MD50d679f63defbecd7a3344d7e385d9764
SHA10fd94cb2f70537b4dbb068388fe827c55b227855
SHA256f0499028b1b9606f403ecf26f9f1f608931f27d02b29bab6f76d93dcf8dbdadb
SHA51230c609c40c6a6f6b9fbeb023d8b97a380ad6681c3bcdf13b7d55c96fef3f39f19b13d2640aeae148c3cf5a2f76321df2b94d0a4d92593dd6fc3837dcddb531f2
-
Filesize
402KB
MD5b99a36389ae45898d1ba785c821b7565
SHA1838eeea58683db363f6b0ef949f759cb38e2cc3b
SHA2569f6e6a7bb24935d77a4a4209dd233a854894dfe81d3c531819392ae4dd792ec2
SHA5127d1d2456aeec9137cf3a3ebbfaacb67a0bab5dd218d887a090357e8c6712aa8cb0c251dfe6e01a0170f1c471a09ceae676797b25fcdf42898fc7671ebf84bbe2