Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 21:44
Behavioral task
behavioral1
Sample
cb214c322d63fe9c02f1e4be50cdf84a56c9f89765c86417e29ad6adb9fc098cN.exe
Resource
win7-20240903-en
General
-
Target
cb214c322d63fe9c02f1e4be50cdf84a56c9f89765c86417e29ad6adb9fc098cN.exe
-
Size
592KB
-
MD5
ede527e53c6cc312aaa1a1737452c520
-
SHA1
accd4d8966a21cabde31941b3fe6d71f62d3a745
-
SHA256
cb214c322d63fe9c02f1e4be50cdf84a56c9f89765c86417e29ad6adb9fc098c
-
SHA512
16301ec885cc2353451c15d6b8f86d0e8cb5445c7deedc1a62e4ed2c36be92aaa5e6f94d406f39dc6312999f5b020b34e4f0faff3840474b0be617178af1b799
-
SSDEEP
6144:CZKHKSIl0SatLPTUrjBpAs/mpYIqaaUN44Iq766ztAkOHn0LHZR0:C4jm0Sat7Az/gZvTIq2WKkw0Fe
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation xopui.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation cb214c322d63fe9c02f1e4be50cdf84a56c9f89765c86417e29ad6adb9fc098cN.exe -
Executes dropped EXE 2 IoCs
pid Process 740 xopui.exe 2268 fuqil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fuqil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb214c322d63fe9c02f1e4be50cdf84a56c9f89765c86417e29ad6adb9fc098cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xopui.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe 2268 fuqil.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3708 wrote to memory of 740 3708 cb214c322d63fe9c02f1e4be50cdf84a56c9f89765c86417e29ad6adb9fc098cN.exe 88 PID 3708 wrote to memory of 740 3708 cb214c322d63fe9c02f1e4be50cdf84a56c9f89765c86417e29ad6adb9fc098cN.exe 88 PID 3708 wrote to memory of 740 3708 cb214c322d63fe9c02f1e4be50cdf84a56c9f89765c86417e29ad6adb9fc098cN.exe 88 PID 3708 wrote to memory of 2308 3708 cb214c322d63fe9c02f1e4be50cdf84a56c9f89765c86417e29ad6adb9fc098cN.exe 89 PID 3708 wrote to memory of 2308 3708 cb214c322d63fe9c02f1e4be50cdf84a56c9f89765c86417e29ad6adb9fc098cN.exe 89 PID 3708 wrote to memory of 2308 3708 cb214c322d63fe9c02f1e4be50cdf84a56c9f89765c86417e29ad6adb9fc098cN.exe 89 PID 740 wrote to memory of 2268 740 xopui.exe 106 PID 740 wrote to memory of 2268 740 xopui.exe 106 PID 740 wrote to memory of 2268 740 xopui.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb214c322d63fe9c02f1e4be50cdf84a56c9f89765c86417e29ad6adb9fc098cN.exe"C:\Users\Admin\AppData\Local\Temp\cb214c322d63fe9c02f1e4be50cdf84a56c9f89765c86417e29ad6adb9fc098cN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\xopui.exe"C:\Users\Admin\AppData\Local\Temp\xopui.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\fuqil.exe"C:\Users\Admin\AppData\Local\Temp\fuqil.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD50a24be36d4272a2da52e0b5d618e5682
SHA1a0679ad9cfd00754381182d344b0a09af00a225a
SHA2569a92ff8d26de32da382c514c68acc982d5ac67ae53e026d15664e36bb97de129
SHA51275e22d7d1268191335ca4b6f61843fd9c99a4f16173bb407860f546cd6cd6b1672555725f8a372c3cf77e4b91b6c69ba0b429ae589788a99b2a2ec0e7d9de460
-
Filesize
323KB
MD5b365569ffc9ee1bc13ad577ecfe4691f
SHA1d2343b59798d2aa6599660c78dffc1ff2bb83497
SHA256eb7ecd384382a24ebe3ed80b10ad8b178f7c5df6d559bad8634d004ae66d20e7
SHA5126aaeabdd915f7dc87b01132d36f09b190102bddeedb9a68c0bed3a62216d9efe967d8a8e3a4410170377cc1d6918d55e52ca71ed51cb44931817b3fcd6f6a368
-
Filesize
512B
MD5a95bef2f0474ac3ce1862c01f3c196ec
SHA1ab34714f53287e4039ebd8f10fc49bb1eb651ef4
SHA25663af98dfd8b48a0529a406fe46babbe966e407d9c4e5e5588f6e48dc1ba2daf8
SHA5124d29f110c0d5b59d311496e35938db2de93e0b7697e7d9de3d88a0388fac0d7bf44b83b704a36b92eec87b0e1a6cb0a2d05a71afc08d3c55c7f7eac282c0e2ff
-
Filesize
592KB
MD5866fcc8a68362e53b7c3008de8dcceba
SHA1783de6231133d67cc8bf4d05d80bd444e199359a
SHA2562d01ee66ecdef9fec51bb1c61b75eb18f5254b8508b7bef0a1bb7d4c9552b014
SHA5127eb9520ff93aca42188fe4aac9a72829383022115309600110b08465d118c054259668330613f21616626e06ca7af8f0a7dffe1b846ee474f67f6369f52c6c03