Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2024, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
a52e0765ff3c2e76c172e781a86ea4ff46f0bd1e25afd69333d2475a2c56757eN.exe
Resource
win7-20240903-en
General
-
Target
a52e0765ff3c2e76c172e781a86ea4ff46f0bd1e25afd69333d2475a2c56757eN.exe
-
Size
6.5MB
-
MD5
79890be584a693a9115d5daa6f1e02f0
-
SHA1
d5efa5308b9fa963ec06a83818331db6f2367ad4
-
SHA256
a52e0765ff3c2e76c172e781a86ea4ff46f0bd1e25afd69333d2475a2c56757e
-
SHA512
f2e06a398f0fe3a35ef2b06967866d9219d4be290b7e0748f078d0fafe04e16f0614d9df6f8f4ed0dd8a0420c11ef71cec703474d71c068fa38eace2efdf4090
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVS8r:i0LrA2kHKQHNk3og9unipQyOaOy
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation fofao.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation nuhugo.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation a52e0765ff3c2e76c172e781a86ea4ff46f0bd1e25afd69333d2475a2c56757eN.exe -
Executes dropped EXE 3 IoCs
pid Process 4448 fofao.exe 5068 nuhugo.exe 1968 nigoc.exe -
resource yara_rule behavioral2/files/0x0009000000023cd0-63.dat upx behavioral2/memory/1968-69-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/1968-74-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fofao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nuhugo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nigoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a52e0765ff3c2e76c172e781a86ea4ff46f0bd1e25afd69333d2475a2c56757eN.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4804 a52e0765ff3c2e76c172e781a86ea4ff46f0bd1e25afd69333d2475a2c56757eN.exe 4804 a52e0765ff3c2e76c172e781a86ea4ff46f0bd1e25afd69333d2475a2c56757eN.exe 4448 fofao.exe 4448 fofao.exe 5068 nuhugo.exe 5068 nuhugo.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe 1968 nigoc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4448 4804 a52e0765ff3c2e76c172e781a86ea4ff46f0bd1e25afd69333d2475a2c56757eN.exe 85 PID 4804 wrote to memory of 4448 4804 a52e0765ff3c2e76c172e781a86ea4ff46f0bd1e25afd69333d2475a2c56757eN.exe 85 PID 4804 wrote to memory of 4448 4804 a52e0765ff3c2e76c172e781a86ea4ff46f0bd1e25afd69333d2475a2c56757eN.exe 85 PID 4804 wrote to memory of 4088 4804 a52e0765ff3c2e76c172e781a86ea4ff46f0bd1e25afd69333d2475a2c56757eN.exe 86 PID 4804 wrote to memory of 4088 4804 a52e0765ff3c2e76c172e781a86ea4ff46f0bd1e25afd69333d2475a2c56757eN.exe 86 PID 4804 wrote to memory of 4088 4804 a52e0765ff3c2e76c172e781a86ea4ff46f0bd1e25afd69333d2475a2c56757eN.exe 86 PID 4448 wrote to memory of 5068 4448 fofao.exe 89 PID 4448 wrote to memory of 5068 4448 fofao.exe 89 PID 4448 wrote to memory of 5068 4448 fofao.exe 89 PID 5068 wrote to memory of 1968 5068 nuhugo.exe 109 PID 5068 wrote to memory of 1968 5068 nuhugo.exe 109 PID 5068 wrote to memory of 1968 5068 nuhugo.exe 109 PID 5068 wrote to memory of 3848 5068 nuhugo.exe 110 PID 5068 wrote to memory of 3848 5068 nuhugo.exe 110 PID 5068 wrote to memory of 3848 5068 nuhugo.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\a52e0765ff3c2e76c172e781a86ea4ff46f0bd1e25afd69333d2475a2c56757eN.exe"C:\Users\Admin\AppData\Local\Temp\a52e0765ff3c2e76c172e781a86ea4ff46f0bd1e25afd69333d2475a2c56757eN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\fofao.exe"C:\Users\Admin\AppData\Local\Temp\fofao.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\nuhugo.exe"C:\Users\Admin\AppData\Local\Temp\nuhugo.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\nigoc.exe"C:\Users\Admin\AppData\Local\Temp\nigoc.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:3848
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD54013db77c4cd6307941364a9b7f8cbd8
SHA18a8ca494052ca6bf35eddcbd6689c3c2533776de
SHA25623bec8f78ca92fee8d180e6583f1e7ab04c52fd19ee32e09fe0fa2e3d808fcbb
SHA51208651253e50a01097a44041b00cb82a03dc3a9756f8bd6b227127b00c910eff8834eb1802bbcbc7e53aea57fc264c307609be1c5e8692525fabc27950736a554
-
Filesize
224B
MD54c33ba54d18e61d02d88e9843e3a309a
SHA131dbe56a51f0e805e20d52d09cd2e4bc42cc112d
SHA2566d61f907225f93378ea8a8f1df0f6a96e7907997cbc39becb8d4259367d218a2
SHA512b8bbaaf98821882a00b10e6c67b8ce742816c13aa4a7f301522a6e67c876a8c740d1fb950b5bcebc48765ef84572a9ed4d88066d96e360f6683cb8e8b16df50c
-
Filesize
6.5MB
MD52180eb1e8cdff51a8a8959b2759d47ec
SHA12fa7d31664e7f908e399c2e7fbfec293b1638b89
SHA2564f0632242469dbc162d438b4aa7c3360d62c66a6f7d868dcb195b0b56ac19a5e
SHA51211d1d1d77c2d67ff46f1947091437d165b444196611a6ed7f798def69cd93ffcf28b63566b09bbb6ee04293880b9a06aa5a8718f7476885226e03b9c9c8b0558
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD586a7f8b54a8a2c6dade76516d9023441
SHA129f4d2bb0afbea30be1b317e7c65577e52310e69
SHA25674af7e057de999bacad60b66f63d568bf63f7662c469f67239381c9fe21a79a1
SHA5127e4a9e54c6954e2569292e90e3f2a32afefacff80bb59c96ac18d3a5f471bc0ef6363dd2bdb6e41bf19a705851404e8f49406cccf659a6fe4a2783029dd945a5
-
Filesize
459KB
MD5897775aa9fce5efbc2daf1461fe46c2b
SHA10a3dcc436f05663cb8b4d69679df6d77b157d226
SHA256cb75ee9e6117ef2ab98cfac1d298a4885606748b5bc6768b6605bc10deb6a232
SHA512031fe902df35c38fb99cb8413dbd96c514020297e924006c6bf71d5f583de772d2641b6294907be29f02dd944567c7f7da66ea571a2f8ca08fdfe9b6cc771f61