Analysis
-
max time kernel
118s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2024, 00:54
Behavioral task
behavioral1
Sample
957041f222e9267bb1f7fdbb4aed006e0dc4ba8c4922a07b43a55dc7fe2b17f4N.exe
Resource
win7-20241010-en
General
-
Target
957041f222e9267bb1f7fdbb4aed006e0dc4ba8c4922a07b43a55dc7fe2b17f4N.exe
-
Size
1.1MB
-
MD5
1cd06da3cd3bca9f799fcc8df4fd76d0
-
SHA1
d24eef01099a4daa0c26b273baf541de2cf5f577
-
SHA256
957041f222e9267bb1f7fdbb4aed006e0dc4ba8c4922a07b43a55dc7fe2b17f4
-
SHA512
b4a285b5596a4e04ef650bd6fadb8abb32418a2cd3271e3a2b4d0f7d990130e932f33c6af25e0d549c857145c6fc5cb59b1fe221594f0495709d619bb05fe175
-
SSDEEP
12288:tEr6bkpYN2jF7vQZmSohg+k7j6aDG4FuA6lpgTIJcqBZ5Y1:tcykpY5852j6aJGl5cqB8
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation vasyj.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation jujegi.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 957041f222e9267bb1f7fdbb4aed006e0dc4ba8c4922a07b43a55dc7fe2b17f4N.exe -
Executes dropped EXE 3 IoCs
pid Process 1468 vasyj.exe 3408 jujegi.exe 264 buydv.exe -
resource yara_rule behavioral2/files/0x000a000000023ce0-32.dat upx behavioral2/memory/264-39-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/264-43-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 957041f222e9267bb1f7fdbb4aed006e0dc4ba8c4922a07b43a55dc7fe2b17f4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vasyj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jujegi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language buydv.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 264 buydv.exe 264 buydv.exe 264 buydv.exe 264 buydv.exe 264 buydv.exe 264 buydv.exe 264 buydv.exe 264 buydv.exe 264 buydv.exe 264 buydv.exe 264 buydv.exe 264 buydv.exe 264 buydv.exe 264 buydv.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3508 wrote to memory of 1468 3508 957041f222e9267bb1f7fdbb4aed006e0dc4ba8c4922a07b43a55dc7fe2b17f4N.exe 86 PID 3508 wrote to memory of 1468 3508 957041f222e9267bb1f7fdbb4aed006e0dc4ba8c4922a07b43a55dc7fe2b17f4N.exe 86 PID 3508 wrote to memory of 1468 3508 957041f222e9267bb1f7fdbb4aed006e0dc4ba8c4922a07b43a55dc7fe2b17f4N.exe 86 PID 3508 wrote to memory of 3604 3508 957041f222e9267bb1f7fdbb4aed006e0dc4ba8c4922a07b43a55dc7fe2b17f4N.exe 87 PID 3508 wrote to memory of 3604 3508 957041f222e9267bb1f7fdbb4aed006e0dc4ba8c4922a07b43a55dc7fe2b17f4N.exe 87 PID 3508 wrote to memory of 3604 3508 957041f222e9267bb1f7fdbb4aed006e0dc4ba8c4922a07b43a55dc7fe2b17f4N.exe 87 PID 1468 wrote to memory of 3408 1468 vasyj.exe 89 PID 1468 wrote to memory of 3408 1468 vasyj.exe 89 PID 1468 wrote to memory of 3408 1468 vasyj.exe 89 PID 3408 wrote to memory of 264 3408 jujegi.exe 110 PID 3408 wrote to memory of 264 3408 jujegi.exe 110 PID 3408 wrote to memory of 264 3408 jujegi.exe 110 PID 3408 wrote to memory of 4816 3408 jujegi.exe 111 PID 3408 wrote to memory of 4816 3408 jujegi.exe 111 PID 3408 wrote to memory of 4816 3408 jujegi.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\957041f222e9267bb1f7fdbb4aed006e0dc4ba8c4922a07b43a55dc7fe2b17f4N.exe"C:\Users\Admin\AppData\Local\Temp\957041f222e9267bb1f7fdbb4aed006e0dc4ba8c4922a07b43a55dc7fe2b17f4N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\vasyj.exe"C:\Users\Admin\AppData\Local\Temp\vasyj.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\jujegi.exe"C:\Users\Admin\AppData\Local\Temp\jujegi.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\buydv.exe"C:\Users\Admin\AppData\Local\Temp\buydv.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4816
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD50745769dfcccc782a1be035c72ad5a80
SHA19eb4ee056290e078c9c4f0f90baf021f6f6918bb
SHA25657ad03f6a04ee18621a62d12f077903c7f466498dfe4873fb64b0478fd3f470e
SHA51264e2e54800767bf7b9049e4d3321174c2e49f5b8f1dae861eef3472993e2cdfbdbf4ccd3635329612b8c18068e99a715d02019b6652acd349e33d09533931d9a
-
Filesize
224B
MD532b3adf8bbd2009a02d6fceedcf7ec09
SHA12a7e156c842cd506979232be042d9e6ad76d8494
SHA256c6926ee52dbf3379ee9f9afa8817376c16d08ee9c423c9ee68229635bb54738d
SHA512530db2077a555ea21b51d98736f84c54689935068bece63c82a8f3731b4c56159bb1368760f28fbb73a95b81a124c54bbe42791477384c20714ced7c10a5308b
-
Filesize
459KB
MD56550c55380861f75967b2d47af33c2da
SHA1d701b617d704c4fbbb285896425219c3ec20fede
SHA2562d4dd81fb1f1db55b4da0fad4f4b5a97a8a57f74deec41f9ab1f5d9e4febdafb
SHA5121edb97310befc976513dca32163eae6b6f5f84323fca3408a4a64ea7807a11e2d80d21edb6d1bc2f571c0371896535192f0ad4852cb46cd170ab2978992a3c01
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5c498b2f83d14afb258c68c3ae460e0f7
SHA1cf0b825e6ada4ff310f559c0a9cc334c6e7bbe69
SHA256d134b9307ec21e35b1bc75f81c2cf0d655e3002d4e9d9f5689222347927c0781
SHA5122adcdef1476e6ad688d91fce0e375a0734ff38bfdd8a5a2eaff63e920b4efb51b4800eaa9687cc23cc3deefb19a81e2141c5e74183e7d2221848e82e56d3f78f
-
Filesize
1.1MB
MD5c67ae8900016f2c0ddf69acfb17e9aed
SHA180405d7ad78b77a39690669e5c7029015620e352
SHA256311b5fbc9abcc6c074d7c46f3f8f58f8f362ccce995abdc749a958e10ce06bac
SHA51215dc4aca866582a567be8c7bcc6d227e26324abb530285f651e56a69f4ab07fc653fda94eb7bbcf9cc798cdfe9e6f69f4bb16cd83b29f25b3de718b862ef945f