Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 21:00
Static task
static1
Behavioral task
behavioral1
Sample
bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342N.exe
Resource
win7-20240903-en
General
-
Target
bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342N.exe
-
Size
332KB
-
MD5
a802406b8f20f3c1120794c61e6ea080
-
SHA1
1a6bebbfbe96c6a8dfb577f89032caa18413e6ed
-
SHA256
bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342
-
SHA512
ff3617fa3ac161512fc3e13d75cc77542a5f0976a0d2583b336578e309c7c6fdb07f3c6f711410ad38e1fa8182dde94ca4490de70ec66937f114146c46631004
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVC:vHW138/iXWlK885rKlGSekcj66ciEC
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342N.execosut.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342N.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation cosut.exe -
Executes dropped EXE 2 IoCs
Processes:
cosut.exekobig.exepid Process 3812 cosut.exe 332 kobig.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342N.execosut.execmd.exekobig.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cosut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kobig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
kobig.exepid Process 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe 332 kobig.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342N.execosut.exedescription pid Process procid_target PID 1492 wrote to memory of 3812 1492 bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342N.exe 88 PID 1492 wrote to memory of 3812 1492 bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342N.exe 88 PID 1492 wrote to memory of 3812 1492 bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342N.exe 88 PID 1492 wrote to memory of 2160 1492 bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342N.exe 89 PID 1492 wrote to memory of 2160 1492 bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342N.exe 89 PID 1492 wrote to memory of 2160 1492 bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342N.exe 89 PID 3812 wrote to memory of 332 3812 cosut.exe 102 PID 3812 wrote to memory of 332 3812 cosut.exe 102 PID 3812 wrote to memory of 332 3812 cosut.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342N.exe"C:\Users\Admin\AppData\Local\Temp\bb304b10f102c0137f15ea0357f2d2f148814e1dfd99d68e28b00854f8a65342N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\cosut.exe"C:\Users\Admin\AppData\Local\Temp\cosut.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\kobig.exe"C:\Users\Admin\AppData\Local\Temp\kobig.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5f97f8213a4f0d7fa17839b84e35f1359
SHA1158608023d066718130cba51f540f9719d6e0d1c
SHA256cb262acda89e1b82055d31a120fb3b36e8908cd6db0d135b1ca6193b0a0a68ed
SHA51240d61ddd719878c163d3d19e3002dffa454401082bc502971e5c02c92d335a330d6c1f44f58907f4f0367b35cd20f4840c924497962c74e4df39544ac0fe578f
-
Filesize
332KB
MD597fcfacb6ac2ae93e9a0c1ed5918cfa1
SHA1add9b6680b314177074f045598f036ace5fcab11
SHA256eaca976fd1b45ff4805b376ed7e328cb27aa030da4ea2bcb988c2ff5409eda82
SHA512a92ff06de9499f3eb0f821ff7102916fe4fb118ddb1543c065c06f67ae52010f7ddaa9760d445e3da28b1d4141c91c74078857b41ae818a4f5ca3d271a4e5ad0
-
Filesize
512B
MD51914ce65aee63a5da88fd948c29a54ec
SHA13d6a9b98085f695128211c8f7912108a14452434
SHA256d075e3243e26810d8c4b104ff5fb663bd3a51c826656f4a5c0b29a2e153ec135
SHA512f0ce9963a10d99d8bc661fc8b0ced7e63a1c4c3831e13efc62c75d05bac71e73ec824fe4d9fa5c462451c53506e3cec7baec0d888c1738b2b057f93ce4ece5e2
-
Filesize
172KB
MD5615a38f4e2ba4db0ca98b9d6fdf93fbf
SHA1db1fdc95edfd445f249c932218c1a3b14c89315c
SHA256093d8483d14919d39eaf3bb269ee173b8cfe2d6d948f13745ebeb1cbb010edb3
SHA512036db159f060e1c8fad987d8cd0e87b7f40fadd96117cc108d48b52e57b2587916dfd0071e7dda989d82bda6598460140775302b598ed0a9950f0bd9f282ee07