Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2024, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe
Resource
win7-20240903-en
General
-
Target
7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe
-
Size
332KB
-
MD5
13992396b49c6e96678bffe09a3b8cb0
-
SHA1
49a6b856d8be5ed9e7e5835545a640f559f5b114
-
SHA256
7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192
-
SHA512
5f38620cf2f423eb73b2aa323ae82c7ca51903f9456f5a2994a5960db7ce5cbebe5c89de9c3f4285487ccb0b872b7724a42a4189da5240624418831458f61f30
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYU:vHW138/iXWlK885rKlGSekcj66ciB
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation zydum.exe -
Executes dropped EXE 2 IoCs
pid Process 4664 zydum.exe 3392 miluk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zydum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language miluk.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe 3392 miluk.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4664 4804 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe 88 PID 4804 wrote to memory of 4664 4804 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe 88 PID 4804 wrote to memory of 4664 4804 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe 88 PID 4804 wrote to memory of 4168 4804 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe 91 PID 4804 wrote to memory of 4168 4804 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe 91 PID 4804 wrote to memory of 4168 4804 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe 91 PID 4664 wrote to memory of 3392 4664 zydum.exe 109 PID 4664 wrote to memory of 3392 4664 zydum.exe 109 PID 4664 wrote to memory of 3392 4664 zydum.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe"C:\Users\Admin\AppData\Local\Temp\7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\zydum.exe"C:\Users\Admin\AppData\Local\Temp\zydum.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\miluk.exe"C:\Users\Admin\AppData\Local\Temp\miluk.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD572cf3be34e2def38ded4e5de41ad1c36
SHA1b05f8a4e1443014527616972c605afad11326bea
SHA2568d17bab488d97db4cd55ffb3b62deb5eaed6dca58dfa797ba2c43bd734dbd725
SHA512e5fb259d814a1b4bcbbc833a27e439c5346b9aa084758be38097e3a9abbeb0676bb11ca912b398633a43e11b34ec802b2c930d8f9f5eed30d1305b4131706da2
-
Filesize
512B
MD564bebb71ef97c819e093b2c1e83c48b6
SHA15dbe22ac6d7f7ca8e9d09cc19d83bd67e5fb143e
SHA25631082fc5ee2cd25854e9dad10473a3dc6ca2c1fd7dbd6ff47f6e8b8abeffcb90
SHA51248c602d03121b859412091d2de50301610f81539bb36d7cfd4c8814baefc18bbdac7406e23117265bdda61f88e25a88862178aa28cfd1d3baeeb99947209628c
-
Filesize
172KB
MD540bd5df3e97d00394469f39e3208b425
SHA18ae5fef90648ef8536317724cca4ca7286daf29e
SHA25689df8247ac45afb34a44e842e99587bc8dd0cb5561b2ac2ea9648e23aa14e519
SHA5122b7366369d0ee5152df8337a8ec674a819225ac4f48c4e23a40d714c7df89db7461fd7cf0bdc8ae9873f5a69b8f7b817f3f191d95ddcd52d7bf0c5f953141be6
-
Filesize
332KB
MD5e995209ce7675dec62a776e2c493854a
SHA17a94e9c930bd5523d7da5b62e2a254ab27110537
SHA256ce1d75231c16695ef96068a9fe645d357e2921700fc5e0149fecf971b7293967
SHA512641e366a9c3512facdb80ca4bbc595067b4859b68cdd653fd959d057780108d760d5f17dcf464ca2e6ef01bf29603f47a26943f2fa855e44d837124ed9f72075