Analysis
-
max time kernel
120s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe
Resource
win7-20240903-en
General
-
Target
228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe
-
Size
331KB
-
MD5
b2b46805c6d9040e35b03cbcc2291570
-
SHA1
1f8c09742e89bc1920b0996382875069a2699ed7
-
SHA256
228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799
-
SHA512
05b4587e1e080bafc8d6b1c5f373273e0601d9e73fcf20ad33c19721e1cee1b89b3ea57081e301adac512b9140a2ea3b088b4ccfa176ae627d0823e4b9413580
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVH:vHW138/iXWlK885rKlGSekcj66ciEH
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation iwujy.exe -
Executes dropped EXE 2 IoCs
pid Process 2064 iwujy.exe 4864 amxey.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amxey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iwujy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe 4864 amxey.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2064 1736 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 88 PID 1736 wrote to memory of 2064 1736 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 88 PID 1736 wrote to memory of 2064 1736 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 88 PID 1736 wrote to memory of 4912 1736 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 89 PID 1736 wrote to memory of 4912 1736 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 89 PID 1736 wrote to memory of 4912 1736 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 89 PID 2064 wrote to memory of 4864 2064 iwujy.exe 109 PID 2064 wrote to memory of 4864 2064 iwujy.exe 109 PID 2064 wrote to memory of 4864 2064 iwujy.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe"C:\Users\Admin\AppData\Local\Temp\228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\iwujy.exe"C:\Users\Admin\AppData\Local\Temp\iwujy.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\amxey.exe"C:\Users\Admin\AppData\Local\Temp\amxey.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5321fde60b66c64c4701cb5b752f9d577
SHA1217bdea5ccb5a394cf3da4f6147192343f9e6dbd
SHA2564ebdee2fa534f770db37aca411d0ef97cd23540daf2f6fd39b4b73839571156a
SHA51275036d7a7aac9e4a51335c3901ba5157701ba8f0b81264c050cecabb73185643cf6f71545d4683413b88fcd794d666805655251584c5aa89eac76cf6294c833e
-
Filesize
172KB
MD557db1bbb9bbbdbc16595f7d252b95c99
SHA1915c983f5187b1771206d424f4c0cc5bf7e73919
SHA25641e7c7c6b8de24c052dcf1149d9d15a399a46e695742fd4b1b46f55b2207accb
SHA512ba9a6940ffb28d936df93b9897c8a304b0b7c5e16ae532f54c8f18f8cb65504cebf196c1eb4c9bf123c8a03992f1b842005a73ceb6ca2b13e434aa961e5125b4
-
Filesize
512B
MD520be9356894025334d381d507df89fca
SHA1b747244421b6be0f2fe8f99eab2f1b56d3e3acb6
SHA256fc52d69823f6e5f429a012fe46000f05d8367978fe4d1394b7d80a8d4a5dde5e
SHA51207f0723071417a5ccf08e9d289ca987e4d4bfe3beebbea1ae8dd07fb78bd35987d1b014e59dcc37fa6e04830361a50d289f087ace1216626994c93829c50579a
-
Filesize
331KB
MD5f5d2579ed7519d357530a6cbad99a5e7
SHA193aab3385113708a9388ace76c10f717333b2c9d
SHA25695ec6619dad9291d10ebc28916679be6aa4c040109f2cb4ede16aecae39c7eec
SHA51246dc0fa564da133f6b3fefa10d2cefd75e7c9f4974fb075c3cd2a6308063e158ace4e45878ff3e77451adc32cc717f05d2b5ce4443ad671c13b55c39020785f2