Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe
Resource
win7-20240903-en
General
-
Target
6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe
-
Size
331KB
-
MD5
58ce05c8d85a601405b81ccda398ccd7
-
SHA1
d62b4c797bc633d1f5a2c4972fb854bef98ed31b
-
SHA256
6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842
-
SHA512
a4da37e691149968aa0917d153967c465cf87993baa6cceb6c9486d62bc0b82969cafb30e93518990ef471dcc88d94c6329fc80a3a58be67e2bdb95050354c0c
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYd:vHW138/iXWlK885rKlGSekcj66ciQ
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exesuviz.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation suviz.exe -
Executes dropped EXE 2 IoCs
Processes:
suviz.exeguybw.exepid Process 5088 suviz.exe 3276 guybw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exesuviz.execmd.exeguybw.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language suviz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language guybw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
guybw.exepid Process 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe 3276 guybw.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exesuviz.exedescription pid Process procid_target PID 2980 wrote to memory of 5088 2980 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe 90 PID 2980 wrote to memory of 5088 2980 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe 90 PID 2980 wrote to memory of 5088 2980 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe 90 PID 2980 wrote to memory of 816 2980 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe 91 PID 2980 wrote to memory of 816 2980 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe 91 PID 2980 wrote to memory of 816 2980 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe 91 PID 5088 wrote to memory of 3276 5088 suviz.exe 112 PID 5088 wrote to memory of 3276 5088 suviz.exe 112 PID 5088 wrote to memory of 3276 5088 suviz.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe"C:\Users\Admin\AppData\Local\Temp\6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\suviz.exe"C:\Users\Admin\AppData\Local\Temp\suviz.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\guybw.exe"C:\Users\Admin\AppData\Local\Temp\guybw.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5a5b1795728b662942114fb3bc208d709
SHA106544a3822b6bf1cd7bbcb730865a8908d2ef784
SHA256274009e193b1af404eaad6e63515a1bff124295973cfb179ce7bfe06ee04fec6
SHA512fff863ea7228c3316d7437fa04c9d53e6d959ba9272db85feffb3becea34b642b21f37225559169acac5b0e1ca6facd03615d9755c804fdcf473557a344c142b
-
Filesize
512B
MD55898478d1007bd22e0104ddc2d0f2979
SHA17bdbb812d436328538b1c2ac0d2fc95f11483e2d
SHA2569b2f7f9e7f25ed4adb155192b6bf1332f57ec5faf229da99044462741f09126e
SHA5125bad815c2a91eb810216ea190451eeaf609dbe485bb305d2bcc7a53a0975f76ecd832923caa5a9311b21d2cba52f8a995918cd0aaa2713e8bc9919bb217b73a5
-
Filesize
172KB
MD5943d0bf4d080115227e2ee0513f9250a
SHA1753f2eedaf319e74d9f82e676939b80381e07d46
SHA2563ea2f8fb4af7fa1941ca2c29eea4088056ebe0117078ab3c8f2a5cc43892d87c
SHA512cf7455e47266a95535696ed053558fa10c8219e233f60e993cc39a6e70aa25c46506c74820ebc6d7f48061cf9165607a4db59c876befbc6b874eaface414426d
-
Filesize
331KB
MD56409fbdfbb8974b1d1096a38dd4a1aab
SHA1f1e7b011442041dae59f0fd1cb2f555ced70d114
SHA2566f4a1dabecf384c1405b8a3a38606ae967118c673b6ac7280f150167830a5090
SHA5120d2c6dcce41524aa089c01fbb2177cd9dafa14ecd23a843e5f4399ba8474613fb2db017c7236995c2b0bcb31e7fe89325d57e2a0879502f8915cae8fd1cfca51