Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe
Resource
win7-20241010-en
General
-
Target
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe
-
Size
6.5MB
-
MD5
897f9c7d871aa6cfee73a8a226b2ce00
-
SHA1
71a7b5a797d80cc76fb7dbc0d209eacb290ccc0b
-
SHA256
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e
-
SHA512
d668d0a14399ff53680d138ba041e6fff2cf36241588d42aedeecab3095f575d6579b6878224975f9b0c0f68508bb466a2efdf2ff5bd4924db9982e610f7d070
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSo:i0LrA2kHKQHNk3og9unipQyOaOo
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ruhoce.exef5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exegedev.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ruhoce.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation gedev.exe -
Executes dropped EXE 3 IoCs
Processes:
gedev.exeruhoce.exerukoc.exepid Process 3388 gedev.exe 2812 ruhoce.exe 3124 rukoc.exe -
Processes:
resource yara_rule behavioral2/files/0x0009000000023cd7-64.dat upx behavioral2/memory/3124-71-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/3124-75-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exef5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exegedev.execmd.exeruhoce.exerukoc.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gedev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruhoce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rukoc.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exegedev.exeruhoce.exerukoc.exepid Process 632 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe 632 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe 3388 gedev.exe 3388 gedev.exe 2812 ruhoce.exe 2812 ruhoce.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe 3124 rukoc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exegedev.exeruhoce.exedescription pid Process procid_target PID 632 wrote to memory of 3388 632 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe 86 PID 632 wrote to memory of 3388 632 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe 86 PID 632 wrote to memory of 3388 632 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe 86 PID 632 wrote to memory of 772 632 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe 87 PID 632 wrote to memory of 772 632 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe 87 PID 632 wrote to memory of 772 632 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe 87 PID 3388 wrote to memory of 2812 3388 gedev.exe 90 PID 3388 wrote to memory of 2812 3388 gedev.exe 90 PID 3388 wrote to memory of 2812 3388 gedev.exe 90 PID 2812 wrote to memory of 3124 2812 ruhoce.exe 108 PID 2812 wrote to memory of 3124 2812 ruhoce.exe 108 PID 2812 wrote to memory of 3124 2812 ruhoce.exe 108 PID 2812 wrote to memory of 4544 2812 ruhoce.exe 109 PID 2812 wrote to memory of 4544 2812 ruhoce.exe 109 PID 2812 wrote to memory of 4544 2812 ruhoce.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe"C:\Users\Admin\AppData\Local\Temp\f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\gedev.exe"C:\Users\Admin\AppData\Local\Temp\gedev.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\ruhoce.exe"C:\Users\Admin\AppData\Local\Temp\ruhoce.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\rukoc.exe"C:\Users\Admin\AppData\Local\Temp\rukoc.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4544
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD599c774238dde8dcabbcbd9218b3186a0
SHA1db3cc894f3457dd2a28d2bf15c63159c4c8b634e
SHA256cbe3415c7e081687de8473980ee98e6271e9b9fc9a07c91d1ea3858ba29b270e
SHA5126863c40cd29af1e5074269dbd77e493ebc527a4e065166a55abeee892cbf121cf22cbda37f5cf3f92e4bcf1a86b82db95f0312f51f1e69482570b9b212bd6430
-
Filesize
224B
MD5c6b4fd9724d3acadde72f074b7f72e0c
SHA1412fdeafd1e880316ab987fa848e3009585b94d9
SHA256d97bfd0af4f028ae86a2ccf92a9e8ff78773409b33836691638ff799060714e5
SHA512c8cb44b0982d6bdc30209ad752c3dae18de9d9827d9d8fd51b6c7b882952020367f42ad045f4366c92cf768dba3c27bcdceb27e93d3961856c4af149cecf49ce
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
6.5MB
MD5e8b88762d5594168038d6d7641011883
SHA1beb51257b6e7628f6d1c0f062db302d852256917
SHA2561e68589f03bf9f1070a005adc42146161e12dbdfa0996242a7c54c3ec0c2b4a6
SHA5128818f5f7bc2ed1ee6e8c651c79fa3fa6a8255bbe4744af8b362fcb93e9508d733356b52bde2b6b303c1e1dae6c78bd9c5460e442e5230eb9c5fc45c2b50fcc88
-
Filesize
512B
MD550ffcff27c1deda79c9431ed2fdf16c3
SHA12e4b99d338b3bdf07cd041ceaf83d2aec6ab02bf
SHA2568b05dbba9b7bfb7ae8eb0dc097d5def24919d5f340b7a3e90914f4b001a5f3ac
SHA5121db5e2dc8fbaec7ecdef19cd7a99f255e203c57cc87d11faa42682ce24c0adcdbd38d14e99b750f67b1f30085d99d0bc088673f84634c546fcfca2c4c95ee5e2
-
Filesize
459KB
MD57765b43b21beef9e44d6ed78756deb36
SHA15934011912a3b161508c48c0e62e8fb93126b324
SHA256f66dc207b565a3fe2d10b62898b915e2ec927274e2b15fef6147d3706686ef27
SHA512f0e70ffdb462aff14e0247e67ee072779b9b299961faddd0ff89e637fdfbfbbe6bb75d96f7a41cf2fd8a73d421ae5e0352a0610be907ba0f9b9b7e170181126d