Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 23:37
Static task
static1
Behavioral task
behavioral1
Sample
5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893.exe
Resource
win7-20241010-en
General
-
Target
5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893.exe
-
Size
331KB
-
MD5
2f0ef1635939f533b6748635655ec64a
-
SHA1
d11dea3716c70cc1d3958280a4b5093670fe4a87
-
SHA256
5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893
-
SHA512
cb3d74d99dd0c5a2599ee836a1155ae7485483e6a4f5ebdab90e1f2dad917da66187ce2a9190659e7e9f18f4b6063d1d09f0e1f49aacbd5fa1329b081e05e0e6
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVn:vHW138/iXWlK885rKlGSekcj66ciEn
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893.exeargez.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation argez.exe -
Executes dropped EXE 2 IoCs
Processes:
argez.exemoqoz.exepid Process 1604 argez.exe 1668 moqoz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893.exeargez.execmd.exemoqoz.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language argez.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moqoz.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
moqoz.exepid Process 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe 1668 moqoz.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893.exeargez.exedescription pid Process procid_target PID 3380 wrote to memory of 1604 3380 5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893.exe 88 PID 3380 wrote to memory of 1604 3380 5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893.exe 88 PID 3380 wrote to memory of 1604 3380 5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893.exe 88 PID 3380 wrote to memory of 1824 3380 5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893.exe 89 PID 3380 wrote to memory of 1824 3380 5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893.exe 89 PID 3380 wrote to memory of 1824 3380 5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893.exe 89 PID 1604 wrote to memory of 1668 1604 argez.exe 102 PID 1604 wrote to memory of 1668 1604 argez.exe 102 PID 1604 wrote to memory of 1668 1604 argez.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893.exe"C:\Users\Admin\AppData\Local\Temp\5b5541c8a94f98e38ebac66eb5009d36eea569c473be2b2396fe2489e8016893.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\argez.exe"C:\Users\Admin\AppData\Local\Temp\argez.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\moqoz.exe"C:\Users\Admin\AppData\Local\Temp\moqoz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5c22be246c83b4a82251d635b9db17513
SHA1777b281a4961eadfb262683d1bc1831f6dba5e6a
SHA256c82836682e0e4cddb5d93844038ef76e48d0568a0aa64591e274ab76d8cf23d4
SHA5122c2748c0d4bd8ab8cb0049fc18acdc8fa21e9576e88bf54e106ced12417f799d1d475d0762c6084009a0275cadbd05ba40b55d5cdb08122642d67475aeb9de32
-
Filesize
331KB
MD58c8c01d582d3debbec68a45ab2fc8dc2
SHA1a43d5232ee868a6770fa4fd87e099fbed7904e3b
SHA256a784c519a56749aba1ef9e7db6593fc5369ab0658712e990e8e254945f97eb4e
SHA512f06f97baa782356e65e36277a100b4b5b3cad79840ab4f8faa425905aabbfd5db2216994709278d375504701aad3a3e426429194cd47fb7627e081022655179d
-
Filesize
512B
MD5352d4b1915d5e0c9a78f2ce36da2a2f7
SHA129fcc571e5b62c07e7365d5515692592d05f72ef
SHA2561437c5d3161ea5769daeaa32308778c3caa28348c6a0b487459819dbfa442810
SHA512093ff067d5ce5aa82bdec1b6341e6ee4dc254b42becf1983ee675488db4cd577580df1d5cdc5c38866bb4c39407c9181d1d02979ced6248a63558f21b9c8cafb
-
Filesize
172KB
MD51b68867902171581d5f2b3fd8f1540af
SHA199145a9e33f15172b56488e59d955a3b522f682b
SHA2560923c3b12e5298cb5822becfabbf90bb532964fd0f573393743436aa0bde49d6
SHA5126fd4b1e91f62139965430f8de487a5d4c8dea1de36315a4e6b78d15e381e132fc8b8336664ca037f38a8eb32b05a496ecea6bd166857c7f815bd2993c3fbfd91