Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 13:38
Static task
static1
Behavioral task
behavioral1
Sample
896af404b97206a74df3d1213c8b1c5657f0fbbc207aeb4ac30864df5faf3afe.exe
Resource
win7-20240903-en
General
-
Target
896af404b97206a74df3d1213c8b1c5657f0fbbc207aeb4ac30864df5faf3afe.exe
-
Size
332KB
-
MD5
53b4aad111dd092c1ed41cdacdff51ed
-
SHA1
529d031eda234ec9ed2c0cf252154544c054176c
-
SHA256
896af404b97206a74df3d1213c8b1c5657f0fbbc207aeb4ac30864df5faf3afe
-
SHA512
c8436f4e032d23f0dc8dbc51a2c3e034fee3c40126dab94c0ee0791105ace7bd3ef3fea47b92d4452b860f251273c53412c13e0550b45ad3528838cad403751a
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYf:vHW138/iXWlK885rKlGSekcj66ciS
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 896af404b97206a74df3d1213c8b1c5657f0fbbc207aeb4ac30864df5faf3afe.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation cezef.exe -
Executes dropped EXE 2 IoCs
pid Process 2476 cezef.exe 464 elgev.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language elgev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 896af404b97206a74df3d1213c8b1c5657f0fbbc207aeb4ac30864df5faf3afe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cezef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe 464 elgev.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3580 wrote to memory of 2476 3580 896af404b97206a74df3d1213c8b1c5657f0fbbc207aeb4ac30864df5faf3afe.exe 88 PID 3580 wrote to memory of 2476 3580 896af404b97206a74df3d1213c8b1c5657f0fbbc207aeb4ac30864df5faf3afe.exe 88 PID 3580 wrote to memory of 2476 3580 896af404b97206a74df3d1213c8b1c5657f0fbbc207aeb4ac30864df5faf3afe.exe 88 PID 3580 wrote to memory of 2072 3580 896af404b97206a74df3d1213c8b1c5657f0fbbc207aeb4ac30864df5faf3afe.exe 89 PID 3580 wrote to memory of 2072 3580 896af404b97206a74df3d1213c8b1c5657f0fbbc207aeb4ac30864df5faf3afe.exe 89 PID 3580 wrote to memory of 2072 3580 896af404b97206a74df3d1213c8b1c5657f0fbbc207aeb4ac30864df5faf3afe.exe 89 PID 2476 wrote to memory of 464 2476 cezef.exe 103 PID 2476 wrote to memory of 464 2476 cezef.exe 103 PID 2476 wrote to memory of 464 2476 cezef.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\896af404b97206a74df3d1213c8b1c5657f0fbbc207aeb4ac30864df5faf3afe.exe"C:\Users\Admin\AppData\Local\Temp\896af404b97206a74df3d1213c8b1c5657f0fbbc207aeb4ac30864df5faf3afe.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\cezef.exe"C:\Users\Admin\AppData\Local\Temp\cezef.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\elgev.exe"C:\Users\Admin\AppData\Local\Temp\elgev.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD51b5679d98aa27ce59af39bee793ac5ba
SHA1165d9906d3e10c631adf587bc205ee48a30181a7
SHA2564ac71c1a8674ff3b59a7d181587199ed849a480c47b0d1035bed4995b361a9f4
SHA51222cb254358f0b8511c9f630dcf1d96f4e56351c49f18a5350aeb467796efca839c281cb9073f17647f43030e656dc612210b3e802f1103cd54f3a11eb7afa50b
-
Filesize
332KB
MD56f721ab612b06c270a42cfd5841a6970
SHA1fbaf60ccf5dacd08fea1028ac22a147735e74ceb
SHA25684f2c40b6c2703ab892f9c841e1af5543189b11f07b59ac52f1c6086e058e4bb
SHA51238bfa15028e56e6471b70c29b241902035d8f96bdbfbc57b0964edcbb8f3b0c31c69a1e9e52fbfacc5e9fef3f9acabe932ce239d319982d22e7e71abbd9005fe
-
Filesize
172KB
MD561ea126d14b9b07a77c9fa24662d2b44
SHA176b9aa707bf6b235cfa4b5178ad2391ef22ddf46
SHA2568b58d4511be7fc534a9650a7bb569a55c36948b4ee9017f00c79423b0b3d4cd7
SHA512fc782bc1cfb0d7661a74ef71111907d3fdca67fa866adaa89a6177fec7714276f3b25af609bf003d3cf7d7903ed8a7d961377723d5434732aa97be30bd2f2cb1
-
Filesize
512B
MD575474537a2733ba706dbf27aca9fc996
SHA1ca5fa3efcd7a36e8b54ce9288973e4c932a3e311
SHA2560270c96f17f48377e4c4afa8d40e70717bff2fe0e84830cb23ca677d9cd1f135
SHA512d8973f5bb381ce46cc4eb6295fa4bf203d705db6a897f12f8f9610a41e74e6f7d7ba3650982907180f4290ce2b8a755dcfd38bb1c1b760478fbd6a16a8aca3e4