Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 06:22
Static task
static1
Behavioral task
behavioral1
Sample
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe
Resource
win7-20240903-en
General
-
Target
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe
-
Size
6.5MB
-
MD5
897f9c7d871aa6cfee73a8a226b2ce00
-
SHA1
71a7b5a797d80cc76fb7dbc0d209eacb290ccc0b
-
SHA256
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e
-
SHA512
d668d0a14399ff53680d138ba041e6fff2cf36241588d42aedeecab3095f575d6579b6878224975f9b0c0f68508bb466a2efdf2ff5bd4924db9982e610f7d070
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSo:i0LrA2kHKQHNk3og9unipQyOaOo
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exezilua.exerigure.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation zilua.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation rigure.exe -
Executes dropped EXE 3 IoCs
Processes:
zilua.exerigure.exenotuz.exepid process 3928 zilua.exe 3096 rigure.exe 3184 notuz.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\notuz.exe upx behavioral2/memory/3184-70-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/3184-75-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exef5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exezilua.execmd.exerigure.exenotuz.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zilua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rigure.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notuz.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exezilua.exerigure.exenotuz.exepid process 2544 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe 2544 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe 3928 zilua.exe 3928 zilua.exe 3096 rigure.exe 3096 rigure.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe 3184 notuz.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exezilua.exerigure.exedescription pid process target process PID 2544 wrote to memory of 3928 2544 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe zilua.exe PID 2544 wrote to memory of 3928 2544 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe zilua.exe PID 2544 wrote to memory of 3928 2544 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe zilua.exe PID 2544 wrote to memory of 1836 2544 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe cmd.exe PID 2544 wrote to memory of 1836 2544 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe cmd.exe PID 2544 wrote to memory of 1836 2544 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe cmd.exe PID 3928 wrote to memory of 3096 3928 zilua.exe rigure.exe PID 3928 wrote to memory of 3096 3928 zilua.exe rigure.exe PID 3928 wrote to memory of 3096 3928 zilua.exe rigure.exe PID 3096 wrote to memory of 3184 3096 rigure.exe notuz.exe PID 3096 wrote to memory of 3184 3096 rigure.exe notuz.exe PID 3096 wrote to memory of 3184 3096 rigure.exe notuz.exe PID 3096 wrote to memory of 2216 3096 rigure.exe cmd.exe PID 3096 wrote to memory of 2216 3096 rigure.exe cmd.exe PID 3096 wrote to memory of 2216 3096 rigure.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe"C:\Users\Admin\AppData\Local\Temp\f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\zilua.exe"C:\Users\Admin\AppData\Local\Temp\zilua.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\rigure.exe"C:\Users\Admin\AppData\Local\Temp\rigure.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\notuz.exe"C:\Users\Admin\AppData\Local\Temp\notuz.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2216
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD5648266b1aba852bd22379f048bffb89c
SHA1823570aed8ac39ccd25cb67539652b03cec52283
SHA256dfe3961d3369b10df2483280f13ddeaf75d0c7569cf396275260edee3a2e2856
SHA512f9a0c8fa6eca49c9aa159115632e9a0cc1285c6e275c2a0c1330a8a31c63db20708b0f2974d795f0f27e22b97b30f4d9ef1d7f9fffb863d791e252b743cd36ac
-
Filesize
340B
MD599c774238dde8dcabbcbd9218b3186a0
SHA1db3cc894f3457dd2a28d2bf15c63159c4c8b634e
SHA256cbe3415c7e081687de8473980ee98e6271e9b9fc9a07c91d1ea3858ba29b270e
SHA5126863c40cd29af1e5074269dbd77e493ebc527a4e065166a55abeee892cbf121cf22cbda37f5cf3f92e4bcf1a86b82db95f0312f51f1e69482570b9b212bd6430
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5075d051fe0dfbe9c521a6e5b0208ffa5
SHA1c4bdcb64f7a608cc68ffad4e44b7fbd6abeb889e
SHA256229861765b43a2d9a30cdbbc5ab46643aeaec12b0eaa4da136e3f8d9e0b5a79e
SHA5121d144d679e387c534daf1701dfb78e4239ba36525eecec0494cc379e971a29aba28fd805dfc8d24bfa55b417f25e733005dcfdd33064777c44142395ec0c69a9
-
Filesize
459KB
MD5c7d39e49ece7f7c82737ba0f317a2860
SHA10c1c7aed1f2570a7c4d4478d71f4bd73ad52d5b1
SHA256fc407d5c85803dc0ac78206b5f153eb464ac35d28b92efe75994c2d3b5e21f2c
SHA512ccefc836a9516f4056b6656ee82f4ae76c93f37c6b98edffbf95d59491c682350d94b458f0a5bb08f49bb60e89510274a41d4e4aef18584eec784978d025f401
-
Filesize
6.5MB
MD5da45587ca740d3d8951fc9f3b4428800
SHA1e5e11de8f8aeb63577363841ba802ef9f0d389af
SHA25630c13a82b9ee8b11220cab130625be099642c0bce7bad392323f46bddef7dc45
SHA512bf9534d6856f5837b152c10844a24dc829f0045296b73a5686979f0841e4b58c1a1e8731122074fcc148a91a911d54f579a46b09ade25d2c7cb2e2c599364144