Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 02:48
Static task
static1
Behavioral task
behavioral1
Sample
228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe
Resource
win7-20241010-en
General
-
Target
228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe
-
Size
331KB
-
MD5
b2b46805c6d9040e35b03cbcc2291570
-
SHA1
1f8c09742e89bc1920b0996382875069a2699ed7
-
SHA256
228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799
-
SHA512
05b4587e1e080bafc8d6b1c5f373273e0601d9e73fcf20ad33c19721e1cee1b89b3ea57081e301adac512b9140a2ea3b088b4ccfa176ae627d0823e4b9413580
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVH:vHW138/iXWlK885rKlGSekcj66ciEH
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation lubew.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe -
Executes dropped EXE 2 IoCs
pid Process 5080 lubew.exe 3948 yzabt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lubew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yzabt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe 3948 yzabt.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3596 wrote to memory of 5080 3596 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 88 PID 3596 wrote to memory of 5080 3596 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 88 PID 3596 wrote to memory of 5080 3596 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 88 PID 3596 wrote to memory of 2700 3596 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 89 PID 3596 wrote to memory of 2700 3596 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 89 PID 3596 wrote to memory of 2700 3596 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 89 PID 5080 wrote to memory of 3948 5080 lubew.exe 104 PID 5080 wrote to memory of 3948 5080 lubew.exe 104 PID 5080 wrote to memory of 3948 5080 lubew.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe"C:\Users\Admin\AppData\Local\Temp\228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\lubew.exe"C:\Users\Admin\AppData\Local\Temp\lubew.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\yzabt.exe"C:\Users\Admin\AppData\Local\Temp\yzabt.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5321fde60b66c64c4701cb5b752f9d577
SHA1217bdea5ccb5a394cf3da4f6147192343f9e6dbd
SHA2564ebdee2fa534f770db37aca411d0ef97cd23540daf2f6fd39b4b73839571156a
SHA51275036d7a7aac9e4a51335c3901ba5157701ba8f0b81264c050cecabb73185643cf6f71545d4683413b88fcd794d666805655251584c5aa89eac76cf6294c833e
-
Filesize
512B
MD55e34ce86e2d2aa15dce0594302df6f9d
SHA1f5c5f7b1282fb2819502b4d980b542eab46bc2f7
SHA256872579a4df319c7677ec1de40fccf984ec39711f1ef09c3872789a913df1c766
SHA5126c6ad7e7f910075d5b6bcae1316e743da7faeb95d1237a6547907f87064e9fbf163056b9ea43aab034318c2ce23f7e3621570ca56aed16882cd2e618c6cac9a8
-
Filesize
331KB
MD5a0849284fa724643826d27079ac00ab6
SHA179ec4e0e81dc28a179b4ba72cec61429325375db
SHA256f1f4714e012f19059353a3d597e4a9c2c7989dabef2bf23b83c7f1d2a5809968
SHA5126aebd82e0405439d568e76bc11336fb1ba00c84d8ecdc954a5a70a058805a24d57bd050a827826d3c936d5b9adf13272b208df0b7ae4bbf00a19a037d9f3c707
-
Filesize
172KB
MD58abcd6283e9af5530b18510bc21b7ce4
SHA1f55415442a14eadec3a475ff8f045f4bb6c44c24
SHA25634a0dae87ef3659618f3146585c71659362b58d3183727674e18bac3fcfe5591
SHA512d699d1ebe95e5c2ade940641b51b1f2f9434b028edd94f212e3e88449a85cded9ec964a04965c68fb89f75bbd222f3faed38ed5d1dbef65f20d4b126f987937e