Analysis
-
max time kernel
119s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2024 14:48
Behavioral task
behavioral1
Sample
8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe
Resource
win7-20240903-en
General
-
Target
8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe
-
Size
403KB
-
MD5
c769bee14908ab982b432883968b83e0
-
SHA1
c49f0b736847fa69ccc308f61ed6d5e65f6e128b
-
SHA256
8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5
-
SHA512
90151e14f65afe3c9471a812591b9fd61f0cf3387ddcc2755ef9d59309c6529978e5001daad9ffbc65559eb3ca420123f5716b1b0a2897056f9876a72a88db44
-
SSDEEP
6144:85SXvBoDWoyLYyzbkPC4DYM6SB6v+qLnAzYmhwrxcvkzmSBrohl:8IfBoDWoyFblU6hAJQnOz
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exeuxryz.exesodasy.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation uxryz.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation sodasy.exe -
Executes dropped EXE 3 IoCs
Processes:
uxryz.exesodasy.exeziluc.exepid Process 3996 uxryz.exe 532 sodasy.exe 2916 ziluc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exeuxryz.execmd.exesodasy.exeziluc.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxryz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sodasy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziluc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
ziluc.exepid Process 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe 2916 ziluc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exeuxryz.exesodasy.exedescription pid Process procid_target PID 3900 wrote to memory of 3996 3900 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 84 PID 3900 wrote to memory of 3996 3900 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 84 PID 3900 wrote to memory of 3996 3900 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 84 PID 3900 wrote to memory of 2564 3900 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 85 PID 3900 wrote to memory of 2564 3900 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 85 PID 3900 wrote to memory of 2564 3900 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 85 PID 3996 wrote to memory of 532 3996 uxryz.exe 87 PID 3996 wrote to memory of 532 3996 uxryz.exe 87 PID 3996 wrote to memory of 532 3996 uxryz.exe 87 PID 532 wrote to memory of 2916 532 sodasy.exe 103 PID 532 wrote to memory of 2916 532 sodasy.exe 103 PID 532 wrote to memory of 2916 532 sodasy.exe 103 PID 532 wrote to memory of 3004 532 sodasy.exe 104 PID 532 wrote to memory of 3004 532 sodasy.exe 104 PID 532 wrote to memory of 3004 532 sodasy.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe"C:\Users\Admin\AppData\Local\Temp\8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\uxryz.exe"C:\Users\Admin\AppData\Local\Temp\uxryz.exe" hi2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\sodasy.exe"C:\Users\Admin\AppData\Local\Temp\sodasy.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\ziluc.exe"C:\Users\Admin\AppData\Local\Temp\ziluc.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5d5cda0c50c2cfdd33e5d1f0f0a72a235
SHA1695bcf9195615b9e1971ba311d17bee0d7836ef6
SHA25669a5bed46ccae4ca029f3ddd8e18bfff5a799e3457fed5e0b3552ec10e2f378c
SHA512d29c5c1b562a201cc6cffd12ec571c6ac9d1e4ef1a1818d6625d55528a69569c9549a03bc017bf03bc96ad97685a10319fae72ee09c027b3272d17d1814096aa
-
Filesize
224B
MD5c072bb36421e0c8bd967f23affcb2f22
SHA156a224fe8988b38f8d04c6db5b19faaa9f356c12
SHA256963c5def6009019219df6492b831f63a5d6f264128ab01c7ac40baadd80d45ff
SHA512b7d9d4bdefcd9de5217b07a58181a6e410f2e5906e34442d98d7f58b23ad27b20c30c5966c88fdf1a35ec03c31f060e80e4e57df38ceb4380f9b34c1b2cd0a22
-
Filesize
512B
MD5263a17a5884938aff9bed370da3c4298
SHA17424d11f6a5edf3e7bdaf871aed9f83160b4dd29
SHA256fcf82a006e075b57aa83e672a0a5748ba2294c900906dfc38d7647d67f708c01
SHA5127912db592f6f8aaea9f7f5c0b849bdd99ad12838c73ac0db8296af74b9db633691e01ea905b5b1615a72942ae467f699d33a877131d1636b325ac641c18ed386
-
Filesize
403KB
MD5a3d95d0e9badaadacf6940928917a7ee
SHA1c02cf842a77c06f4ba624ad865dd56f5bc7e9ede
SHA25688a20dccf6894cf30697b5aa60abf381d149b10a4c6f83dc2cf262c1e5d36452
SHA51215f432af22a3ee15c792589e1e5a7e4d9981c8c5f1bd0536bb7cff15223c773234c01a30ec61e5a4d0fa12d4232bf66ee8e6d677acc94e032558f610a464b4ac
-
Filesize
403KB
MD53ac999f87c693b64e3feec1a782579b0
SHA18fd6d2436683eb575a529cbb18a6a7237fe901c4
SHA256adb15ff9e644d54f83b40c5470bbdd53f608f4d89bf33ee51ca5b080fea4e2aa
SHA512c66a56e99688041b536941fd3625ad5f756febdc8e5f30e377c5746cd0d9505dac3252d5ed4bcf6822c213ffa05441979faa9f06817657dc8ba1214288d6a1d8
-
Filesize
223KB
MD5e9e35f58469e7d2c38af24c3b4ac495c
SHA1d4930831a08c4699f48c5a61a8a7060a56ce7629
SHA256a510035635453ff62dbb80deaf8632ef9a50d34c8bd5409b950d503eb4293221
SHA51287b76b3cfc5a892aa85653cebf1603d972e16b69b6d31cec56ed1e970a3a749bbc6a48a528409f38f6a93213ece6910e07fd8aed284ae0a1bddd7ef8c2ad27a5