Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 03:06
Behavioral task
behavioral1
Sample
39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8.exe
Resource
win7-20240903-en
General
-
Target
39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8.exe
-
Size
401KB
-
MD5
11734828f928becb6e9c2394eaea3da7
-
SHA1
d094132e3dac9f4d8f91866d4b4cd2a25dd82cfc
-
SHA256
39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8
-
SHA512
c45771184caaff0cefcc2281c6400130dce9e7bad05175e4f1e12a4d35159f6eedc0d25b180e99d1513915a020ad5d8c95b47d11e72fad0c126799182817138f
-
SSDEEP
6144:GzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOc:oU7M5ijWh0XOW4sEfeOc
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Processes:
resource yara_rule behavioral2/files/0x000b000000023ab0-22.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8.exebutus.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation butus.exe -
Executes dropped EXE 2 IoCs
Processes:
butus.exemovym.exepid Process 1364 butus.exe 536 movym.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
movym.exe39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8.exebutus.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language movym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language butus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
movym.exepid Process 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe 536 movym.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8.exebutus.exedescription pid Process procid_target PID 4924 wrote to memory of 1364 4924 39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8.exe 90 PID 4924 wrote to memory of 1364 4924 39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8.exe 90 PID 4924 wrote to memory of 1364 4924 39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8.exe 90 PID 4924 wrote to memory of 1252 4924 39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8.exe 91 PID 4924 wrote to memory of 1252 4924 39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8.exe 91 PID 4924 wrote to memory of 1252 4924 39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8.exe 91 PID 1364 wrote to memory of 536 1364 butus.exe 112 PID 1364 wrote to memory of 536 1364 butus.exe 112 PID 1364 wrote to memory of 536 1364 butus.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8.exe"C:\Users\Admin\AppData\Local\Temp\39230e59da5c5d0b1a3bb9095d20c2d154ccd05722aab860e9bc7bea1e770dd8.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\butus.exe"C:\Users\Admin\AppData\Local\Temp\butus.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\movym.exe"C:\Users\Admin\AppData\Local\Temp\movym.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD584798bc2371d82a490ac6c0718e12d56
SHA1b1aedc1784c2e70f8cb29521e1b9408407f3590c
SHA2563a50e680f754c817f54df366aa265501df5c2a833cfc4e981584e2161aab1919
SHA5129215059f7e0b2b8ffe108bd64147578193fb85969c72ebaa5f10dcc6bdc4ca32847dfef410fe57626c6e674518700b7a2a13a7f6aa825657316ad63e03399890
-
Filesize
401KB
MD5bc5cac13095fda98d8322dc452fd06c1
SHA1f5787c559a883f74362a0a69452bbfa935c29ebb
SHA256961a791e0cb09be7412df4f6895197f1547bc6487cbbfec92261f32e9976ea38
SHA5128a96845882258b7e0bd0a2007f8eff3cde53604ca763a8d15340a9644eb3d211059d5afa7b71359601c29195f4742f59e5d37d401741e84cc17b713fd2b4f899
-
Filesize
512B
MD548dd8def284e1986788c927b4fed72ca
SHA143b99ebd0a3ec0b5d61e43c608c634b67e681520
SHA256167f264473d4005ab5c92ad74f1539537ed3f2dc0d5fa1017f94d9882ce353f3
SHA5122fd516f7d66baa06ffef3efa26ce60a3d889053b3a94bd3aa5f05f6c9a1cb153221599083107d53f5be50185c2a9e7ba1802082cd112c879a74c4b3169ad3dff
-
Filesize
212KB
MD561169d7a683cb0520851159243c6f2e7
SHA1d8202be0ef9c5c298693527b6d6b259fc9954b57
SHA256c904d13dbae900d53963dac579cb6d1caa94ddc57578d1416d456215ce8d0126
SHA512b0369cb85a5d6677a74a73661330f195b4db549c7bb795c0f070d1e8acadd939d39e90aff296e6c9c64db0a7be6c80bf45dde59f480bd076e152c5fcd1e20ff5