Analysis
-
max time kernel
119s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 21:46
Static task
static1
Behavioral task
behavioral1
Sample
c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009eN.exe
Resource
win7-20241010-en
General
-
Target
c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009eN.exe
-
Size
332KB
-
MD5
3735c64c1f391aa92b9d9575339510b0
-
SHA1
dd49e6ed58abb9e09cccc264f8a26d62ec41d901
-
SHA256
c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009e
-
SHA512
ce4a0dc11e5fb7b9a0324b32d7f9501afd1d16c39fda1a5e8c7fd423ff0e7ebdfd8b313670ebfc92c0f7903f4d23e07bf4d7b2c92bc7a143dd68825d758dd1ff
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVr:vHW138/iXWlK885rKlGSekcj66ciEr
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009eN.exefawio.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009eN.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation fawio.exe -
Executes dropped EXE 2 IoCs
Processes:
fawio.exepypex.exepid Process 4648 fawio.exe 3428 pypex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009eN.exefawio.execmd.exepypex.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fawio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pypex.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
pypex.exepid Process 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe 3428 pypex.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009eN.exefawio.exedescription pid Process procid_target PID 4396 wrote to memory of 4648 4396 c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009eN.exe 89 PID 4396 wrote to memory of 4648 4396 c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009eN.exe 89 PID 4396 wrote to memory of 4648 4396 c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009eN.exe 89 PID 4396 wrote to memory of 2476 4396 c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009eN.exe 90 PID 4396 wrote to memory of 2476 4396 c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009eN.exe 90 PID 4396 wrote to memory of 2476 4396 c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009eN.exe 90 PID 4648 wrote to memory of 3428 4648 fawio.exe 103 PID 4648 wrote to memory of 3428 4648 fawio.exe 103 PID 4648 wrote to memory of 3428 4648 fawio.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009eN.exe"C:\Users\Admin\AppData\Local\Temp\c8e0c5b420545c005b8ffd1c9ebf3ff7c52afada3503d44a562600f5bd8c009eN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\fawio.exe"C:\Users\Admin\AppData\Local\Temp\fawio.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\pypex.exe"C:\Users\Admin\AppData\Local\Temp\pypex.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5f5223b7c0aee190f7ced0dac4721abb1
SHA1f1af6f4ec51f92ef6ccb99218ac23fc90430d1a1
SHA256d82074d4f1961799821738b774a7ffe97b2b44de26e2ee9837c87416afe0dc54
SHA5128373880892aefd5835decc1dae239129827e420c45cd7d5d6c7f5ce66999a3f211b218b94d3c0b5cfb4c57ef7bb395560a1669bf2c40a75ecd76f37a70872264
-
Filesize
332KB
MD51c91d0bfa70d11fb339283ee18e09645
SHA1bb4b88ab5c3ed95919e5e9fd61655be77f52f911
SHA2561e14764a3323b866ff4bf3dc29a69aa8d3e92dc202ff54f76c485d9f64bcb0a9
SHA512338512478f6b54f170917314e230a3d618c05dd822cb555975f4527d1191ca1ff3fbc1a14de6006d01f1587cc37fefb89e88a11dfb8c94ec4e7443a99f1ba9ac
-
Filesize
512B
MD5ccc3e84030f3006412d7360c1823c22c
SHA12bad1267cd9a0f552ae24171b94a842cb84baed0
SHA25667a7fafe116b68f110a7ba4df8e6cdb89f8e2ca19abf3a31c5cf851040ce612a
SHA512601e604b6595e2578a1004709fb08dc367b819ebf288116b37f026eeb23dfec812de931cf48247f4a7f08094c022e35759d39eaea6737948859c39962f59f97f
-
Filesize
172KB
MD5124b1c84ba46e8107af377c9aded9c61
SHA183d3b946215b0369898657db1280f3cf4be1e5ce
SHA2565eee15e1150de7bb77b681e19ef22e91f5e93ad7a97289fb60c1941f49d75409
SHA51276da946ad880ac37b047562eced7ffe3616e01841bacb0978dd4825bde8ce6d5df50f298d25778e56487e6102bde43449efa7af039a1464a68fe2db653a0bd88