Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe
Resource
win7-20240903-en
General
-
Target
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe
-
Size
332KB
-
MD5
e5f8cc34c92ec51b668f856467e5d249
-
SHA1
aa954ce38e44d15e8519af2a28ae70a3f69caed0
-
SHA256
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48
-
SHA512
27aeaecff813fb2902e42480dba7b57a1f6adb29daa78aa9f23c0ead88db07e53fc9476c731488c08db81b151111dc91c8bf2e8e04a525c0959a0febb774a546
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY6:vHW138/iXWlK885rKlGSekcj66ciX
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exeloecu.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation loecu.exe -
Executes dropped EXE 2 IoCs
Processes:
loecu.exeweocz.exepid Process 2272 loecu.exe 4588 weocz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
weocz.exe7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exeloecu.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language weocz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loecu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
weocz.exepid Process 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe 4588 weocz.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exeloecu.exedescription pid Process procid_target PID 4788 wrote to memory of 2272 4788 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 88 PID 4788 wrote to memory of 2272 4788 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 88 PID 4788 wrote to memory of 2272 4788 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 88 PID 4788 wrote to memory of 3044 4788 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 89 PID 4788 wrote to memory of 3044 4788 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 89 PID 4788 wrote to memory of 3044 4788 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 89 PID 2272 wrote to memory of 4588 2272 loecu.exe 102 PID 2272 wrote to memory of 4588 2272 loecu.exe 102 PID 2272 wrote to memory of 4588 2272 loecu.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe"C:\Users\Admin\AppData\Local\Temp\7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\loecu.exe"C:\Users\Admin\AppData\Local\Temp\loecu.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\weocz.exe"C:\Users\Admin\AppData\Local\Temp\weocz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5c7811635d9753612a28ef415be1223f1
SHA109aa5099ae2977f728692cf9d6f6cbe30d195e95
SHA2568239d4347928a15f77a4eae63c8beedc56f6fe068bfd05b43016a7c299188648
SHA5120bab62e6764cd02aa03142aa6fee342a61ac6853e2bb3eadecd1aa20134339449a54e705ef378f16231cc09d1cad89694cbbf9afa75cfa39198a76aa54104247
-
Filesize
512B
MD59722b94808196ad6741571b09c5b3f30
SHA113d133f36383413d3532b499b5328df422f1924d
SHA256141cf1b727ae76ef905a2bedad539f6dc3a99b0cc342a4bbf1d755b4f62c0977
SHA512dfc7607889f4cbec1adfc67869148da0098dcaf70d1268895cab47b5f0f9132f24b2f6f7c193adbdb691d6b8d753c9d240faa305fd8f6a6f768ea3bd278f8347
-
Filesize
332KB
MD5e1e07e0bb29895aca85114d4c0ed2d41
SHA187e4066f31453c7fafc4f3a5af9f5e8dce25093d
SHA2567fbee2ea6334e0b42f080c8ce64bf4a317a02cd13090d27eead7a38a9b3284ae
SHA51280b801f6bb85ecdab86929c22fa947c34e17309cefc8c8238fdaa0929e84192101e7c52773d374c2891424fcd84623c15d58b9ab463b0056362e326910bde90f
-
Filesize
172KB
MD52a9f2a165dbe872a41ccdf7c3aedbc3b
SHA13590c0beba0e15e20658c29058712be99eef768d
SHA25622389b440c608103a0a7a569cd402a496314ab0dd37abd04b45284f7d23d01dc
SHA5124592c2fd62b828eddf20f46427d0e9a7cb2892e46de6bf01e95cb23d27a4e23d4454d3492e23ea0b2e9a49181db88f0a477f8e3c57c03eb5d758261f54380726