Analysis
-
max time kernel
120s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 22:33
Behavioral task
behavioral1
Sample
c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe
Resource
win7-20240903-en
General
-
Target
c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe
-
Size
413KB
-
MD5
b9f8bd887d225686446883ff875ccb90
-
SHA1
67090bd9de9213f1c08a0f400dd12925cf05daba
-
SHA256
c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8b
-
SHA512
f33bf21f154ed5de651558ba377b993bae2e9bb376f0723320ccca8a7825a9fadfbd657b906e8c276311c097882a3fdce4ea83b2ab4e2274b0132ab34a9ccdfe
-
SSDEEP
6144:tzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInODso:hU7M5ijWh0XOW4sEfeOT
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
resource yara_rule behavioral2/files/0x0010000000023a14-21.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation zusym.exe -
Executes dropped EXE 2 IoCs
pid Process 1524 zusym.exe 1844 xiovk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zusym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xiovk.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe 1844 xiovk.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1524 2396 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 88 PID 2396 wrote to memory of 1524 2396 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 88 PID 2396 wrote to memory of 1524 2396 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 88 PID 2396 wrote to memory of 4860 2396 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 89 PID 2396 wrote to memory of 4860 2396 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 89 PID 2396 wrote to memory of 4860 2396 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 89 PID 1524 wrote to memory of 1844 1524 zusym.exe 109 PID 1524 wrote to memory of 1844 1524 zusym.exe 109 PID 1524 wrote to memory of 1844 1524 zusym.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe"C:\Users\Admin\AppData\Local\Temp\c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\zusym.exe"C:\Users\Admin\AppData\Local\Temp\zusym.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\xiovk.exe"C:\Users\Admin\AppData\Local\Temp\xiovk.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5ef67289238daad92202b4c1fe4097f4f
SHA1f71429724fe3c800d9b15077a0c28ebfed067caa
SHA25635ca3054a3a03ae562b1270445ee4a7851c04364248f84b4feb4cd77f6502659
SHA512500c3849490cce085e27ca20d7d46394789d0b39e64aa56f72772704bcd3820c431b02607e13fcbf966a11765c2d9281e9f7e0db9a88304363a3a5b9dc505ad9
-
Filesize
512B
MD55777b78bed312e8eb4d8d5defc902edc
SHA1b737771b82c0df37722ee84e1a877e9b0f846b34
SHA2565d0500870394a135e448808128e0467278277e25137078afde326f715a4e78d3
SHA51247e195e5fcd2eaf6d5d74298c46e39aecf7aa08c5d42c9e6a997611e498d8fda193f8159a74675704b510373a56f4f68ce6c3d6b92541587d5e4e27da4bce818
-
Filesize
212KB
MD54b323f1debf89abf5f9bf77224ec6c9e
SHA19f5fbba8a0bac181e189eb4322e505982fd1b016
SHA25642eb58f6cf501c988649cfe0f0814db7a7132777f3271ec6155b2dcdc2a2189d
SHA5125dbcc49c21f03ed6dbbc002d033b28d6d2c3ef190954b0e4dada665fc9a41b1776c012f85059774f525fcfe4f7e132ced80f2454f09b00f710b125ac4a66c70a
-
Filesize
413KB
MD5baf2e990d8573763fc564c958e78aeaf
SHA182cf2c18e493077609b6e2063f9d0cc39d3a1e4f
SHA256d0bed5d290d924745b90a59735acc8bea667d2b775a704decfd6d0191db9377f
SHA512f8e64a61b7293bbfba750e1dc54554e633bd1055c7165994b3090c3295aa5c22fe7f10da4be81ec3c61a6f2d08180b53b3754b91512e8257fee19499830375e5