Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe
Resource
win7-20241010-en
General
-
Target
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe
-
Size
332KB
-
MD5
e5f8cc34c92ec51b668f856467e5d249
-
SHA1
aa954ce38e44d15e8519af2a28ae70a3f69caed0
-
SHA256
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48
-
SHA512
27aeaecff813fb2902e42480dba7b57a1f6adb29daa78aa9f23c0ead88db07e53fc9476c731488c08db81b151111dc91c8bf2e8e04a525c0959a0febb774a546
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY6:vHW138/iXWlK885rKlGSekcj66ciX
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ynyni.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe -
Executes dropped EXE 2 IoCs
pid Process 2020 ynyni.exe 5092 susoe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language susoe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ynyni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe 5092 susoe.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4312 wrote to memory of 2020 4312 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 88 PID 4312 wrote to memory of 2020 4312 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 88 PID 4312 wrote to memory of 2020 4312 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 88 PID 4312 wrote to memory of 1424 4312 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 89 PID 4312 wrote to memory of 1424 4312 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 89 PID 4312 wrote to memory of 1424 4312 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 89 PID 2020 wrote to memory of 5092 2020 ynyni.exe 102 PID 2020 wrote to memory of 5092 2020 ynyni.exe 102 PID 2020 wrote to memory of 5092 2020 ynyni.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe"C:\Users\Admin\AppData\Local\Temp\7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\ynyni.exe"C:\Users\Admin\AppData\Local\Temp\ynyni.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\susoe.exe"C:\Users\Admin\AppData\Local\Temp\susoe.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5c7811635d9753612a28ef415be1223f1
SHA109aa5099ae2977f728692cf9d6f6cbe30d195e95
SHA2568239d4347928a15f77a4eae63c8beedc56f6fe068bfd05b43016a7c299188648
SHA5120bab62e6764cd02aa03142aa6fee342a61ac6853e2bb3eadecd1aa20134339449a54e705ef378f16231cc09d1cad89694cbbf9afa75cfa39198a76aa54104247
-
Filesize
512B
MD52b6dcaab060467aedd526706630624a9
SHA197611b2c6b2e5fed3a428080cd3e83531ab38d4e
SHA256bfdaaff98fedc99b98c777a96597ee2c09105c87cd7de5f7eec260647a74f58e
SHA512e880002aaf0d7601c5e27bc3867de7a139c8ac320f4a50f18e7e5c3a1066fac1487709d6ccc7add689e4fa2b76615f0dc1811fe56174f963f68e13dbdfa5aeb3
-
Filesize
172KB
MD55b0d48b11a55585a392af79cb503b0ad
SHA144cd81bdc08925f50e4a71c3baf2c1b63c04d998
SHA256bf3b2619c111d3ebc5b4f93d4e181551574c9b41e1d904c5c1847564e7de195f
SHA512c87dc08df0a1d879102c4f32e3fe26f709bd213f5d3140e3416c49e7cc33265dc6c64826d335f951c1cc0245f64f0b020bb40c1fe5a42268c5008e77cbd670b1
-
Filesize
332KB
MD51e4cf8430fa101652a6ef82327a2f99d
SHA10fee9ee241dc41de882b7cf52943cf1c47cbb4ec
SHA25648fdff162493e6ef8dc36eda391f1eccfb4fdb4db65a9c92d277e36b4b1fbdb5
SHA5128f634378f8206cd959d6593e42ceb443c0daa716753582c1ce48363e27e81af035c892f6895ef23942cbf138ed0dc1ac943967d4f41f5d593bc46485f6016836