Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72N.exe
Resource
win7-20241010-en
General
-
Target
41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72N.exe
-
Size
326KB
-
MD5
50a3d5650fd5b53e793e526147985840
-
SHA1
8e7bc7907a5f24c7bd3331ee3d7ac8b32617b042
-
SHA256
41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72
-
SHA512
79b3208a137098624c847a42cf8fc3370428cafb350b91532ac592b239ebaac55811ff60a2fba5e022097510429b6b2505b7b063786e4dff8650841123636548
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY5:vHW138/iXWlK885rKlGSekcj66ci0
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72N.exerixem.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72N.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation rixem.exe -
Executes dropped EXE 2 IoCs
Processes:
rixem.exexovoq.exepid Process 1460 rixem.exe 2336 xovoq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72N.exerixem.execmd.exexovoq.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rixem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xovoq.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
xovoq.exepid Process 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe 2336 xovoq.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72N.exerixem.exedescription pid Process procid_target PID 1152 wrote to memory of 1460 1152 41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72N.exe 88 PID 1152 wrote to memory of 1460 1152 41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72N.exe 88 PID 1152 wrote to memory of 1460 1152 41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72N.exe 88 PID 1152 wrote to memory of 1664 1152 41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72N.exe 89 PID 1152 wrote to memory of 1664 1152 41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72N.exe 89 PID 1152 wrote to memory of 1664 1152 41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72N.exe 89 PID 1460 wrote to memory of 2336 1460 rixem.exe 102 PID 1460 wrote to memory of 2336 1460 rixem.exe 102 PID 1460 wrote to memory of 2336 1460 rixem.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72N.exe"C:\Users\Admin\AppData\Local\Temp\41c30ab8d57535ff7528e65ede130a88d3bf5a5cf75586d3ec33ea38f084cf72N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\rixem.exe"C:\Users\Admin\AppData\Local\Temp\rixem.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\xovoq.exe"C:\Users\Admin\AppData\Local\Temp\xovoq.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5b65c0e5c9635e3d150f505115b7a84c1
SHA1348b499ff301db54c4b54cf32ba8af5a8274532b
SHA256139f15f77361de23c657a4d6be0499b23fdafb0277b255f357080f2c891e0f05
SHA5123fbed4aa47e2ba8102e0bfa172cfe306997d1f6f443e73292725c68677546f05fd8d6efeba0409606a00eea4c2c70cd5ad112530f657288c208fd5ae038bfd04
-
Filesize
512B
MD5dee9329b9f12dd4d20831cdbfc6459ae
SHA15f5cf3497def7560c1ee2bef166f7fc5cc04b86d
SHA256ec2257f91bdb64c42c08baf847c241e2bc07a2774d5519d9470a18afe95d1eb2
SHA512c9200bef70d5046f052f9b9caa90a77f7015982895684aac2b6e7a6aa9a170466bee74ee159f8cde91c4179bd9986640dccacb70492558b7b215de512321d22d
-
Filesize
326KB
MD52f49af5f08d66f0b42a1b8889b414110
SHA1e5520bed3f20f43f15ab4913cf33424b2a09d79d
SHA256bc9d0ff08e9529ee9d2714912cfd304a0ade4fad457ba36646c812a76969516d
SHA5121672af658d8c6c03b8ccef17ce29283e6cbf2d63271b2dee56139d4aa8dfb892c263cd5d7189f9342561970f67064a74ae03cba589975c0924c2a23e4d3778d8
-
Filesize
172KB
MD542aaec26cbb30a84f1306dfc779d32f1
SHA190027d9a94150f77ff0c4092587c0824dcbf6ff0
SHA25630ba391e394857bdc5f32f82c3471ec07da752e0262d9045cb1629066bf683cf
SHA512ff43f2bbd52bff1461b378f2ea68ad2ceffb825242723beb0cff025ef45c30e1d1a97f37e03e173c2b36269a792a7c83441be1d398044b3e49880666de138a1d