Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 22:58
Behavioral task
behavioral1
Sample
4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75.exe
Resource
win7-20241010-en
General
-
Target
4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75.exe
-
Size
356KB
-
MD5
89280f71892759a8b5d330cbed1a6b9c
-
SHA1
94fc6560599b5020fb558500a094394a5c85af8c
-
SHA256
4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75
-
SHA512
fed9aaf4e187023a341fbb4e785105b436d6f5d6501fa31b2841c87f65b06c37260dff6608671316783ad8dad84e620e190b87e0bfa686a821ad178d0ec03118
-
SSDEEP
6144:c1bYec5C8AAYLxhEmPG7qwmioqVsCqbN0h:MUyI6QmPPPqVsps
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75.exeuwkis.exesoufav.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation uwkis.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation soufav.exe -
Executes dropped EXE 3 IoCs
Processes:
uwkis.exesoufav.exegyada.exepid Process 2532 uwkis.exe 1416 soufav.exe 2800 gyada.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exe4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75.exeuwkis.execmd.exesoufav.exegyada.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uwkis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language soufav.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gyada.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
gyada.exepid Process 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe 2800 gyada.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75.exeuwkis.exesoufav.exedescription pid Process procid_target PID 3676 wrote to memory of 2532 3676 4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75.exe 84 PID 3676 wrote to memory of 2532 3676 4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75.exe 84 PID 3676 wrote to memory of 2532 3676 4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75.exe 84 PID 3676 wrote to memory of 2148 3676 4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75.exe 85 PID 3676 wrote to memory of 2148 3676 4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75.exe 85 PID 3676 wrote to memory of 2148 3676 4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75.exe 85 PID 2532 wrote to memory of 1416 2532 uwkis.exe 87 PID 2532 wrote to memory of 1416 2532 uwkis.exe 87 PID 2532 wrote to memory of 1416 2532 uwkis.exe 87 PID 1416 wrote to memory of 2800 1416 soufav.exe 108 PID 1416 wrote to memory of 2800 1416 soufav.exe 108 PID 1416 wrote to memory of 2800 1416 soufav.exe 108 PID 1416 wrote to memory of 4572 1416 soufav.exe 109 PID 1416 wrote to memory of 4572 1416 soufav.exe 109 PID 1416 wrote to memory of 4572 1416 soufav.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75.exe"C:\Users\Admin\AppData\Local\Temp\4dd9cbea45573b466fea7b19445ee3cf60b300f5297f788a7ea8b3730b498a75.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\uwkis.exe"C:\Users\Admin\AppData\Local\Temp\uwkis.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\soufav.exe"C:\Users\Admin\AppData\Local\Temp\soufav.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\gyada.exe"C:\Users\Admin\AppData\Local\Temp\gyada.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4572
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD5eb1f08665eceeb8ee7f12e11f721a5ad
SHA1e92264d24e2ca208e5ca5903011a19ef637a69ed
SHA2564b91d4a7a1f099327751b64f9c78efd9292a7708dde128022a1a0e15a3ffff87
SHA512e13ce2307b45f771c1f1b52f3771d1a752db38c215458d3c54ca2fe926b8480b63925760d7eaad2e3c66efebb24bb579800ad29bbd6f48139bb609bab422a583
-
Filesize
340B
MD543b5e1b182ac03467b86aded3bc35ae7
SHA1beab788562f4689e9f1d08089073326853990bfb
SHA256d6f55602d33a59eff0bc28cad81fa87407e9e5c51c6fd707c9fb83e3df16f8fe
SHA51225cc7e7c37877a841109d0b000808846696791d5af30e4909ab918f145b2b719b6de7388a7d893e211ffa635c62935311f3cea6628391abf3c71dbdfac428976
-
Filesize
512B
MD5d39c04aeb23b4fae2652244d2ecadcb7
SHA1c79ae1df65c47e4e4dc81e9e2f9eb4e29bdd18a0
SHA256a392458c8a6e1c49f71170bb54354fa37507a8f229d076572358c1da6afb7e31
SHA512f092e30d1282801a1891c9fb038c83bee040547db08adb798cd50b473ed16592ec1b3b03aa24b795d94ff7329a2ca3b4ef46543bc9bdb5aa17fad2004f526a60
-
Filesize
107KB
MD50a22713624074ec66e0dda8ce2a367fb
SHA1e50fafa9d066c028e27df234520beb51892b2519
SHA2563ef802dfd305f539478fcb17b81260848f0f4e31f4ad02903022d9b561aaf882
SHA51218ebf68228c77fad6b3c3334b23fb50b2a4ffe570ea3e34e14c3cc545c05e8efba6b4fece2ce43f0bd9148dd38039824524d152ec10c0640a6455b2594dd6a48
-
Filesize
356KB
MD5b95a337ab14e2ed496e872b4545d4cb7
SHA1859dffcdc65675254d6bfd18f2b52339dfac943d
SHA256ecf9e9d5d56b27da4e5bcad3392598d8ea4e64a1c224daa4c9702b3dfad4cf5b
SHA5129410bcda6ea3a5c093e39ae5dacd548126c596c072c6eb9520a58ff3e77b8b5c7b00fa09525f9eedab017e4fd360e60ab2d9c27239b30108aa7c92e02bee798b