Analysis
-
max time kernel
119s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2024 20:56
Static task
static1
Behavioral task
behavioral1
Sample
f8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81aN.exe
Resource
win7-20240903-en
General
-
Target
f8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81aN.exe
-
Size
330KB
-
MD5
f1e1cde1b78c3011c4d37b778f8f28e0
-
SHA1
1fe7cf690f5b87e656dc61d2e0855347bf511063
-
SHA256
f8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81a
-
SHA512
31bca1575ae095daf1fcd97dc007c839224addbc90c72435dec7557edbfa98027c2785d7fda7874fe7635c670775a2b0f8eadaed30f4ba66d9044476aba71e9a
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYw:vHW138/iXWlK885rKlGSekcj66ci1
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81aN.exenupep.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation f8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81aN.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation nupep.exe -
Executes dropped EXE 2 IoCs
Processes:
nupep.exezecex.exepid Process 716 nupep.exe 4032 zecex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exezecex.exef8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81aN.exenupep.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zecex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nupep.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
zecex.exepid Process 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe 4032 zecex.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81aN.exenupep.exedescription pid Process procid_target PID 4276 wrote to memory of 716 4276 f8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81aN.exe 88 PID 4276 wrote to memory of 716 4276 f8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81aN.exe 88 PID 4276 wrote to memory of 716 4276 f8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81aN.exe 88 PID 4276 wrote to memory of 5040 4276 f8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81aN.exe 89 PID 4276 wrote to memory of 5040 4276 f8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81aN.exe 89 PID 4276 wrote to memory of 5040 4276 f8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81aN.exe 89 PID 716 wrote to memory of 4032 716 nupep.exe 109 PID 716 wrote to memory of 4032 716 nupep.exe 109 PID 716 wrote to memory of 4032 716 nupep.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81aN.exe"C:\Users\Admin\AppData\Local\Temp\f8beae60feb8cb699b63cebd50da965c12ea3bc1f1477adf3c930cba1364f81aN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\nupep.exe"C:\Users\Admin\AppData\Local\Temp\nupep.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\zecex.exe"C:\Users\Admin\AppData\Local\Temp\zecex.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:5040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD53a85ad7e26b9ba614e2c31d19781c991
SHA13145733944a8aa72b818f8878b734efa4f3b1a3b
SHA256785cbb203160b3f082d3b9f1d74a4463dd759228247c63b98f466aab26c7ce16
SHA51239e6f1b31d76356cd04938b7c27bbb487aecad37a51dc05b047d4245ee479bf0bcacb5cd74152e2d30bfc97019f8de7a5084e8b210d6e620c55f5afdf2046ef0
-
Filesize
512B
MD5027f20a534086939be597fb38caa7172
SHA1f518f16c7649bd6058ece05e55c6bdc1ed478d04
SHA2566fb324478f41a027efe52fb276a1069df809a9e624a110612c8d2258416e9798
SHA512e0d1765e90e83557711b6c3060519f959398d89c8154ef9c34c92a65b6d59897bbb2df732e7579e7ccfba60f3a54031aa27a3c8c5a278a86a99722a05527b29d
-
Filesize
330KB
MD55afd5330752de8b7f6a0206709778afe
SHA184f27199fba36f2c4ae567599d086c0c85bd0cdc
SHA256f07c8569ff0e56df2f450207bfbe0befa0e74bb4d1cde24c6583c6d6b55353bb
SHA512cfb803e19643cd906bbac5fb711f9cd7afda035ea2cce07d9e74f62e53028c29259902c15054850c5c7f161d954dfc0591ba4f3ea2aab1af8e117168a7b66735
-
Filesize
172KB
MD54645d17dced3b7956ac6a00b89a73e74
SHA1054bcc4a6b5c6e0208f8cd0868a1a061fd983fcd
SHA2568ccdd36b6a538440ef780722d66cdf9f49e3d9756a0bfa6ddd4297d8e40c59ac
SHA51257a7351dd901ee40ae7854c9ce743ede85247d947f7211b48b117d10e9968f1efc276bc248a97099f87cc359e6827ed0c132c55745975fe87533f68264cd1628