Analysis
-
max time kernel
119s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
111c0686d08c0ff0ecf08a7c0e54b9a48e67da9903bcc9b56763b57b7e7a04c7N.exe
Resource
win7-20240708-en
General
-
Target
111c0686d08c0ff0ecf08a7c0e54b9a48e67da9903bcc9b56763b57b7e7a04c7N.exe
-
Size
333KB
-
MD5
3e1dbcc7e3805d50b0a4c74f3e0adf00
-
SHA1
83830eb0f615665b0eade43144fbbfc8bc92178b
-
SHA256
111c0686d08c0ff0ecf08a7c0e54b9a48e67da9903bcc9b56763b57b7e7a04c7
-
SHA512
0d737ad20eb071e8c4da7a8a6915500bc8e1fd441274f8a27d4193beea033c1e859406442972ef8680444eeb143111ff7a53c56ec9ebb9f82b53e2e7721899ca
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYe:vHW138/iXWlK885rKlGSekcj66ci7
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 111c0686d08c0ff0ecf08a7c0e54b9a48e67da9903bcc9b56763b57b7e7a04c7N.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation jeabv.exe -
Executes dropped EXE 2 IoCs
pid Process 1440 jeabv.exe 2036 koojf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language koojf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 111c0686d08c0ff0ecf08a7c0e54b9a48e67da9903bcc9b56763b57b7e7a04c7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jeabv.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe 2036 koojf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1440 2092 111c0686d08c0ff0ecf08a7c0e54b9a48e67da9903bcc9b56763b57b7e7a04c7N.exe 88 PID 2092 wrote to memory of 1440 2092 111c0686d08c0ff0ecf08a7c0e54b9a48e67da9903bcc9b56763b57b7e7a04c7N.exe 88 PID 2092 wrote to memory of 1440 2092 111c0686d08c0ff0ecf08a7c0e54b9a48e67da9903bcc9b56763b57b7e7a04c7N.exe 88 PID 2092 wrote to memory of 5068 2092 111c0686d08c0ff0ecf08a7c0e54b9a48e67da9903bcc9b56763b57b7e7a04c7N.exe 89 PID 2092 wrote to memory of 5068 2092 111c0686d08c0ff0ecf08a7c0e54b9a48e67da9903bcc9b56763b57b7e7a04c7N.exe 89 PID 2092 wrote to memory of 5068 2092 111c0686d08c0ff0ecf08a7c0e54b9a48e67da9903bcc9b56763b57b7e7a04c7N.exe 89 PID 1440 wrote to memory of 2036 1440 jeabv.exe 107 PID 1440 wrote to memory of 2036 1440 jeabv.exe 107 PID 1440 wrote to memory of 2036 1440 jeabv.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\111c0686d08c0ff0ecf08a7c0e54b9a48e67da9903bcc9b56763b57b7e7a04c7N.exe"C:\Users\Admin\AppData\Local\Temp\111c0686d08c0ff0ecf08a7c0e54b9a48e67da9903bcc9b56763b57b7e7a04c7N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\jeabv.exe"C:\Users\Admin\AppData\Local\Temp\jeabv.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\koojf.exe"C:\Users\Admin\AppData\Local\Temp\koojf.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:5068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5e0ad251730094b81ce3f28e9c15484d1
SHA1d22bea5a5f72b202e9f4d7f0accce4de1ffeb74a
SHA256ea754f1ac13ad6ad9e1f65fdbfaa3cc549ef395a6e2bf273d75d1043491121cc
SHA512c550231c0d52218ad5013c1b016906c50c1444bc6cc44ef6e6ae8baa502c4880c0304bc6f87ce83b61112a242ac73aebe109af6d21b5db3e170e6824cf40967f
-
Filesize
512B
MD56d4aaf7ce3d082339c4daea06248b6fd
SHA1e3181e8cbb2cef00ff5b196b554100838ce1b883
SHA256a409e2f7395a3113554eb758c4f89ec6d425f64aae3d61be3eef79a8fa28da75
SHA512f40b79014134c416f017eb48e9941fa8977c2ff14ed789cebcb1731605f911bf6f1f7e58c82892d529a5e9fa05b3b779adfad82b36b6276064b323a899094874
-
Filesize
333KB
MD5850fafc69fad78520540e753428c85b2
SHA14cfce6ce31623e6789b81392c4a33bbd3bd41108
SHA256da4cec7a204c16ec0909cdf30989bdeda6f010ceb12dfd037ad96533c2a6fdef
SHA5128d1bdc6ccab2dbeed185cb5d66c55d01903114020d7ce4f880c731c7353708ad80998da3f5dfbb5b2eaa3dbd9831809c858086f936c50365f0bdc2c577eaa374
-
Filesize
172KB
MD5e367eb1774cf7b0216ed8d90fdbfe27d
SHA106c3b7a24e6b4b040de84d43ba82fee5e1b376b9
SHA256d730463caad58046826399eaf0f15751de6270c360c65ccaa87b1dc5ce4548be
SHA5127b0fbbc3d1fab4fe793fd1fa12b491bb729912162ec147c174d8693d027aafb4f123e0003a8f0d3c18bbb5d7c0427c56c3e6fd32240482229f03cd566634bbba